2014
DOI: 10.5296/npa.v6i3.5802
|View full text |Cite
|
Sign up to set email alerts
|

Routing Protocols and Quality of Services for Security Based Applications Using Wireless Video Sensor Networks

Abstract: Wireless video sensor networks have been a hot topic in recent years; the monitoring capability is the central feature of the services offered by a wireless video sensor network can be classified into three major categories: monitoring, alerting, and information on-demand. These features have been applied to a large number of applications related to the environment (agriculture, water, forest and fire detection), military, buildings, health (elderly people and home monitoring), disaster relief, area and indust… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…In this case, most of the not delivered data is due to the high collision from sending a huge data in the network. This means that, a new method to reduce data collision will improve the performance of the AODV to deliver more data [5].…”
Section: E New Alternative Routesmentioning
confidence: 99%
See 2 more Smart Citations
“…In this case, most of the not delivered data is due to the high collision from sending a huge data in the network. This means that, a new method to reduce data collision will improve the performance of the AODV to deliver more data [5].…”
Section: E New Alternative Routesmentioning
confidence: 99%
“…This is because a huge amount of data is required to be transmitted when multimedia are delivered from the sensor nodes to a sink, over a long distance. A WSN to transmit the multimedia contents is called Wireless Video Sensor Network (WVSN) [5], [19].…”
Section: Wireless Video Sensor Network and Sensing Coverage Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…It has been demonstrated that the use of a single keying technique is not secure enough to ensure all the message types that circulate through the WSN. Key management is the procedure in which keys are formed, stored, transmitted, used between approved parties, and removed when they are no longer needed . Key management creates essential keys that offer integrity, privacy, and confirmation services.…”
Section: Selezor Descriptionmentioning
confidence: 99%
“…But in these services the Quality of Service (QoS) must be guaranteed [6] [7] in order to provide a good experience at the end user side [8].…”
Section: Introductionmentioning
confidence: 99%