{"title":"Security framework for visual sensors and smart camera networks","authors":"K. Grgic, Vedran Mendelski, D. Zagar","doi":"10.23919/ConTEL.2017.8000049","DOIUrl":null,"url":null,"abstract":"The development of wireless sensor networks and constant increase of their capabilities enabled the integration of image capturing device within sensor node, representing the basis for visual sensor network. Such smart camera is primarily used for converting visual data into knowledge. The paper analyzes security requirements of visual sensor networks and describes possible security threats and attacks, while also suggesting possible countermeasures. Security framework for possible application on visual sensor networks and smart cameras is also proposed, and its components are explained. Finally, some conclusions are derived and suggestions for future development are given.","PeriodicalId":410388,"journal":{"name":"2017 14th International Conference on Telecommunications (ConTEL)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 14th International Conference on Telecommunications (ConTEL)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ConTEL.2017.8000049","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The development of wireless sensor networks and constant increase of their capabilities enabled the integration of image capturing device within sensor node, representing the basis for visual sensor network. Such smart camera is primarily used for converting visual data into knowledge. The paper analyzes security requirements of visual sensor networks and describes possible security threats and attacks, while also suggesting possible countermeasures. Security framework for possible application on visual sensor networks and smart cameras is also proposed, and its components are explained. Finally, some conclusions are derived and suggestions for future development are given.