2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) (2011)
Aug. 30, 2011 to Sept. 2, 2011
Gowun Jeong , AI & Media Lab., Comput. Sci., KAIST, Daejeon, South Korea
H. S. Yang , AI & Media Lab., Comput. Sci., KAIST, Daejeon, South Korea
Wireless visual sensor networks for surveillance can dissipate their limited resources to process irrelevant images maliciously injected by compromised nodes. In particular, since nodes compromised by tampering reveal their security keys to encrypt messages, traditional data authentication techniques cannot identify false data deceivably encrypted by such stolen keys. To challenge this problem, this paper first presents a surveillance-fitted network model where our false data sensitive protocol efficiently works. The protocol allows malicious messages to travel only one hop by authentically and semantically testing every packet and every image sent from wireless cameras vulnerable to tampering. We additionally suggest a dynamic key scheme which lets wireless sensors employ a different key in each communication for reasonable resource consumption, in order to reduce a possibility of key disclosure itself. Two lemmas and three comparison results verify how well our three approaches outperform their alternatives in resiliency to compromised nodes and memory, computation and communication overheads.
key disclosure, secure image transmission, wireless visual sensor networks, surveillance fitted network model, data sensitive protocol, malicious messages
H. S. Yang and Gowun Jeong, "Efficiently secure image transmission against tampering in wireless visual sensor networks," 2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Klagenfurt, 2011, pp. 172-177.