{"title":"Instantaneous mobile video surveillance: A security & quality challenge","authors":"S. Sutor, G. Pujolle, R. Reda","doi":"10.1109/WD.2008.4812864","DOIUrl":null,"url":null,"abstract":"In this paper an instantaneous, high performance, large-scale video surveillance system is presented. Available and future network technologies are analyzed for the dynamical and flexible use of mobile devices in video surveillance. Based on this analysis, video quality levels are proposed followed by wireless ad hoc video surveillance performance levels (WAD levels). Then the systems' structure as well as the underlying technologies are presented. The system is further analyzed to measure its performance and to expose potential security threats and discuss the corresponding counter meas.ures on real-world attack scenarios.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 1st IFIP Wireless Days","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WD.2008.4812864","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper an instantaneous, high performance, large-scale video surveillance system is presented. Available and future network technologies are analyzed for the dynamical and flexible use of mobile devices in video surveillance. Based on this analysis, video quality levels are proposed followed by wireless ad hoc video surveillance performance levels (WAD levels). Then the systems' structure as well as the underlying technologies are presented. The system is further analyzed to measure its performance and to expose potential security threats and discuss the corresponding counter meas.ures on real-world attack scenarios.