4 research outputs found

    Image Similarity based Data Reduction Technique in Wireless Video Sensor Networks for Smart Agriculture

    Get PDF
    International audienceNowadays, to improve animal well being in livestock farming or beekeeping application, a wireless video sensor network (WVSN) can be deployed to early detect injury or Asiatic hornets attacks. WVSN represents a low-cost monitoring solution compared to other technologies such as the closed circuit television technology (CCTV). WVSNs are composed of low-power resource-constrained video sensor nodes (motes). These nodes capture frames from videos at a given frequency (frame rate) and wirelessly send them to the sink. The big amount of data transferred from the nodes to the sink consumes a lot of energy on the sensor node, which represents a major challenge for energy-limited nodes. In this paper, we introduce two complementary mechanisms to reduce the overall number of frames sent to the sink. First, the Transmission Data Reduction algorithm (TDR) run on the sensor node leverages the similarity degree of consecutive images. Second, the Inter-Nodes Similarity algorithm (INS) exploits the spatio-temporal correlation between neighbouring nodes in order reduce the number of captured frames. The results show a 95% data reduction, surpassing other techniques in the literature by 30% at least

    A Study on Intrusion Detection System in Wireless Sensor Networks

    Get PDF
    The technology of Wireless Sensor Networks (WSNs) has become most significant in present day. WSNs are extensively used in applications like military, industry, health, smart homes and smart cities. All the applications of WSN require secure communication between the sensor nodes and the base station. Adversary compromises at the sensor nodes to introduce different attacks into WSN. Hence, suitable Intrusion Detection System (IDS) is essential in WSN to defend against the security attack. IDS approaches for WSN are classified based on the mechanism used to detect the attacks. In this paper, we present the taxonomy of security attacks, different IDS mechanisms for detecting attacks and performance metrics used to assess the IDS algorithm for WSNs. Future research directions on IDS in WSN are also discussed
    corecore