Visual Sensor Networks: Critical Infrastructure Protection

Visual Sensor Networks: Critical Infrastructure Protection

Suseela G, Asnath Victy Phamila Y
ISBN13: 9781522571131|ISBN10: 1522571132|EISBN13: 9781522571148
DOI: 10.4018/978-1-5225-7113-1.ch027
Cite Chapter Cite Chapter

MLA

G, Suseela, and Asnath Victy Phamila Y. "Visual Sensor Networks: Critical Infrastructure Protection." Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 502-522. https://doi.org/10.4018/978-1-5225-7113-1.ch027

APA

G, S. & Y, A. V. (2019). Visual Sensor Networks: Critical Infrastructure Protection. In I. Management Association (Ed.), Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications (pp. 502-522). IGI Global. https://doi.org/10.4018/978-1-5225-7113-1.ch027

Chicago

G, Suseela, and Asnath Victy Phamila Y. "Visual Sensor Networks: Critical Infrastructure Protection." In Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 502-522. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7113-1.ch027

Export Reference

Mendeley
Favorite

Abstract

Visual Sensor Network (VSN) is a network of distributed battery-powered low-cost cameras and CMOS image sensors, each with the capability of capturing, processing, sending, and receiving images. VSN applications include remote monitoring, Security, elderly assistance, Visual Ubiquity, home monitoring, tracking. The highly sensitive nature of images makes security and privacy in VSNs even more important than in most other sensor and data networks. However, the direct use of security techniques developed for scalar WSN will not be suitable for VSN due to its resource constraint. Hence light weight security mechanisms need to be explored. In this chapter the challenging security issues at various layers in VSN are addressed. It also fosters discussion on privacy protection techniques like subjective privacy, Video masking techniques and identifies recent trends in VSN security and privacy. A discussion of open research issues concludes this chapter.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.