Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security
DOI:
https://doi.org/10.13052/jcsm2245-1439.1256Keywords:
Communication security, Network information, Physical distribution, Camera network, Topological mapping, network division inference methodAbstract
At present, most cameras use internal networks and use methods such as Traceroute for security protection, which cannot meet the requirements of camera network mapping. Therefore, a camera mapping scheme of network information and physical distribution is proposed. Firstly, the network topology problem of video content information collection was analyzed. This paper uses the mapping relationship between network space and physical space to propose the subnet division conjecture method and complete the preliminary mapping of the network through video data screening. Considering the insufficient coverage of topology mapping, a judgment and inference method based on Bayesian classification technology and network information is proposed, and the results are corrected and evaluated through the test of Jackard coefficient. In the preliminary network topology performance test, two state-of-the-art schemes are selected for experimental comparison. When the number of nodes in the proposed scheme is 5, 25, and 50, the mapping can be completed in the shortest time, and the accuracy reaches 80%. However, the surveying and mapping accuracy of the proposed scheme in the preliminary test is low, and the network information method is used for data screening. In the final surveying and mapping performance test, when the number of nodes is 40, the accuracy of the proposed scheme is 96%, which is better than previously proposed schemes, while the testing delay time is shorter. The technology proposed in the study has the best overall performance. It can effectively solve the problem of intranet surveying and mapping and has important reference value for the security protection of the camera network.
Downloads
References
A. R. Tajary, H. Morshedlou, “A Simulated Annealing-based Throughput-aware Task Mapping Algorithm for Manycore Processors”. Journal of AI and Data Mining, 2022, 10(3): 311–320.
T. D. Potter, E. L. Barrett, M. A. Miller, “Automated Coarse-Grained Mapping Algorithm for the Martini Force Field and Benchmarks for Membrane–Water Partitioning”. Journal of Chemical Theory and Computation, 2021, 17(9): 5777–5791.
O. Poliarus, Y. Poliakov, A. “Lebedynskyi Detection of landmarks by autonomous mobile robots using camera-based sensors in outdoor environments”. IEEE Sensors Journal, 2020, 21(10): 11443–11450.
V. Srisamosorn, N. Kuwahara, A. “Yamashita. Human position and head direction tracking in fisheye camera using randomized ferns and fisheye histograms of oriented gradients”. The Visual Computer, 2020, 36(7): 1443–1456.
C. Bernhard, H. Hecht. The ups and downs of camera-monitor systems: The effect of camera position on rearward distance perception. Human Factors, 2021, 63(3): 415–432.
K. Yun, Y. Kwon, S. Oh. “Vision-based garbage dumping action detection for real-world surveillance platform”, ETRI Journal, 2019, 41(4): 494–505.
T. Fukuhara, Y. Sakamoto, T. Kuwahara, et al. “Commercial Uncooled Microbolometer Camera Applied to 50-kg Class Satellite.” IEEE Geoscience and Remote Sensing Letters, 2019, 17(2): 332–336.
K. Broadley, A. C. Burton, T. Avgar, et al. “Density-dependent space use affects interpretation of camera trap detection rates.” Ecology and evolution, 2019, 9(24): 14031–14041.
B. Xu, X. Wang, A. A. Razzaqi, et al. “Topology optimisation method for MACL formation based on acoustic measurement network.” IET Radar, Sonar & Navigation, 2019, 13(6): 927–936.
X. Jiang, B. Zheng, W. P. Zhu, et al. “Topological Interference Management with Inaccurate Topology of Network.” IEEE Communications Letters, 2021, 25(11): 3724–3728.
T. Hou, T. Wang, Z. Lu, et al. “Combating adversarial network topology inference by proactive topology obfuscation.” IEEE/ACM Transactions on Networking, 2021, 29(6): 2779–2792.
Zheng X., Tian J., Xiao X., et al. A heuristic survivable virtual network mapping algorithm. Soft Computing, 2019, 23(5): 1453–1463.
X. Liu, X. Zhang, L. Chen, et al. “Data-driven transient stability assessment model considering network topology changes via mahalanobis kernel regression and ensemble learning”. Journal of Modern Power Systems and Clean Energy, 2020, 8(6): 1080–1091.
Y. J. Cho, K. J. Yoon, “Distance-based camera network topology inference for person re-identification”. Pattern Recognition Letters, 2019, 125: 220–227.
J. Lei, L. Niu, H. Fu, et al. “Person re-identification by semantic region representation and topology constraint”. IEEE Transactions on Circuits and Systems for Video Technology, 2018, 29(8): 2453–2466.
C. Huo, L. Liu, H. Bai, “Physical impairments awareness based virtual network mapping strategy of elastic optical networks”. Optoelectronics Letters, 2021, 17(1): 36–39.
R. Nugmanov, N. Dyubankova, A. Gedich, et al. “Bidirectional Graphormer for Reactivity Understanding: neural network trained to reaction atom-to-atom mapping task. Journal of Chemical Information and Modeling, 2022, 62(14): 3307–3315.
X. Wang, Y. Sun, H. Gu, “BMM: A binary metaheuristic mapping algorithm for mesh-based network-on-chip”. IEICE TRANSACTIONS on Information and Systems, 2019, 102(3): 628–631.
A. R. Tajary, H. Morshedlou, “A Simulated Annealing-based Throughput-aware Task Mapping Algorithm for Manycore Processors”. Journal of AI and Data Mining, 2022, 10(3): 311–320.
T. D. Potter, E. L. Barrett, M. A. Miller, “Automated Coarse-Grained Mapping Algorithm for the Martini Force Field and Benchmarks for Membrane–Water Partitioning”. Journal of Chemical Theory and Computation, 2021, 17(9): 5777–5791.
M. McMillan, E. Haber, B. Peters, et al. “Mineral prospectivity mapping using a VNet convolutional neural network”. The Leading Edge, 2021, 40(2): 99–105.
R. P. Astuti, E. Rachmawati, E. Edwar, et al. “Vegetation classification algorithm using convolutional neural network ResNet50 for vegetation mapping in Bandung district area”. Journal In fotel, 2022, 14(2): 146–153.
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.