Cargando…
Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics
Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infe...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4208172/ https://www.ncbi.nlm.nih.gov/pubmed/25184489 http://dx.doi.org/10.3390/s140916235 |
_version_ | 1782341085803053056 |
---|---|
author | Park, Homin Basaran, Can Park, Taejoon Son, Sang Hyuk |
author_facet | Park, Homin Basaran, Can Park, Taejoon Son, Sang Hyuk |
author_sort | Park, Homin |
collection | PubMed |
description | Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks. |
format | Online Article Text |
id | pubmed-4208172 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-42081722014-10-24 Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics Park, Homin Basaran, Can Park, Taejoon Son, Sang Hyuk Sensors (Basel) Article Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks. MDPI 2014-09-02 /pmc/articles/PMC4208172/ /pubmed/25184489 http://dx.doi.org/10.3390/s140916235 Text en © 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/). |
spellingShingle | Article Park, Homin Basaran, Can Park, Taejoon Son, Sang Hyuk Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics |
title | Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics |
title_full | Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics |
title_fullStr | Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics |
title_full_unstemmed | Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics |
title_short | Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics |
title_sort | energy-efficient privacy protection for smart home environments using behavioral semantics |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4208172/ https://www.ncbi.nlm.nih.gov/pubmed/25184489 http://dx.doi.org/10.3390/s140916235 |
work_keys_str_mv | AT parkhomin energyefficientprivacyprotectionforsmarthomeenvironmentsusingbehavioralsemantics AT basarancan energyefficientprivacyprotectionforsmarthomeenvironmentsusingbehavioralsemantics AT parktaejoon energyefficientprivacyprotectionforsmarthomeenvironmentsusingbehavioralsemantics AT sonsanghyuk energyefficientprivacyprotectionforsmarthomeenvironmentsusingbehavioralsemantics |