Cited 4 time in
Cited 6 time in
Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics
- Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics
- Park, H[Park, Homin]; Basaran, C[Basaran, Can]; Park, T[Park, Taejoon]; Son, SH[Son, Sang Hyuk]
- DGIST Authors
- Park, H[Park, Homin]; Park, T[Park, Taejoon]; Son, SH[Son, Sang Hyuk]
- Issue Date
- Sensors, 14(9), 16235-16257
- Article Type
- Activities of Daily Living; Automation; Behavioral Semantics; Data Privacy; Economic and Social Effects; Energy Efficiency; Intelligent Buildings; Low-Latency Transmission; Privacy; Privacy Protection; Radio Fingerprints; Semantics; Smart Environment; Smart Home Technology; Statistical Inference; Ubiquitous Computing; Wireless Sensor Networks (WSNs)
- Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks. © 2014 by the authors; licensee MDPI, Basel, Switzerland.
- MDPI AG
- Related Researcher
Son, Sang Hyuk
RTCPS(Real-Time Cyber-Physical Systems Research) Lab
There are no files associated with this item.
- School of Undergraduate Studies1. Journal Articles
Information and Communication EngineeringETC1. Journal Articles
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.