Cited 4 time in webofscience Cited 6 time in scopus

Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics

Title
Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics
Authors
Park, H[Park, Homin]Basaran, C[Basaran, Can]Park, T[Park, Taejoon]Son, SH[Son, Sang Hyuk]
DGIST Authors
Park, H[Park, Homin]; Park, T[Park, Taejoon]; Son, SH[Son, Sang Hyuk]
Issue Date
2014-09
Citation
Sensors, 14(9), 16235-16257
Type
Article
Article Type
Article
Keywords
Activities of Daily LivingAutomationBehavioral SemanticsData PrivacyEconomic and Social EffectsEnergy EfficiencyIntelligent BuildingsLow-Latency TransmissionPrivacyPrivacy ProtectionRadio FingerprintsSemanticsSmart EnvironmentSmart Home TechnologyStatistical InferenceUbiquitous ComputingWireless Sensor Networks (WSNs)
ISSN
1424-8220
Abstract
Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks. © 2014 by the authors; licensee MDPI, Basel, Switzerland.
URI
http://hdl.handle.net/20.500.11750/3041
DOI
10.3390/s140916235
Publisher
MDPI AG
Related Researcher
  • Author Son, Sang Hyuk RTCPS(Real-Time Cyber-Physical Systems Research) Lab
  • Research Interests
Files:
There are no files associated with this item.
Collection:
School of Undergraduate Studies1. Journal Articles
Information and Communication EngineeringETC1. Journal Articles


qrcode mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE