Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics

Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks.

[1]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[2]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[3]  Thomas Kunz,et al.  Secure Authentication in Wireless Sensor Networks Using RF Fingerprints , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[4]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[5]  Jacques Demongeot,et al.  Multi-sensors acquisition, data fusion, knowledge mining and alarm triggering in health smart homes for elderly people. , 2002, Comptes rendus biologies.

[6]  Peter J. Bickel,et al.  The Earth Mover's distance is the Mallows distance: some insights from statistics , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[7]  Martina Ziefle,et al.  Future Care Floor: A Sensitive Floor for Movement Monitoring and Fall Detection in Home Environments , 2010, MobiHealth.

[8]  Kent Larson,et al.  Activity Recognition in the Home Using Simple and Ubiquitous Sensors , 2004, Pervasive.

[9]  Suresh Venkatasubramanian,et al.  Radio tomographic imaging and tracking of stationary and moving people via kernel distance , 2013, 2013 ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[10]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[11]  Michel Barbeau,et al.  Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.

[12]  Sencun Zhu,et al.  Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[13]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[14]  Marco Gruteser,et al.  USENIX Association , 1992 .

[15]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[16]  Jianliang Xu,et al.  Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2012, IEEE Transactions on Knowledge and Data Engineering.

[17]  Gwenn Englebienne,et al.  Accurate activity recognition in a home setting , 2008, UbiComp.

[18]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[19]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[20]  Richard Harper,et al.  The Connected Home: The Future of Domestic Life , 2012 .

[21]  Sang Hyuk Son,et al.  A comparative study of privacy protection methods for smart home environments , 2013 .

[22]  Kamin Whitehouse,et al.  Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.

[23]  Yang Xiao,et al.  A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID , 2011, Wirel. Commun. Mob. Comput..

[24]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[25]  Xiaojiang Du,et al.  Lightweight Source Anonymity in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[26]  Ilias Maglogiannis,et al.  Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[27]  Jong Kim,et al.  Protecting location privacy using location semantics , 2011, KDD.

[28]  E. Campo,et al.  WSN-HM: Energy-efficient Wireless Sensor Network for home monitoring , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[29]  N. Sriraam,et al.  An ubiquitous healthcare system using a wearable shirt for a smart home-a pilot study , 2010, 2010 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES).

[30]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[31]  Leonidas J. Guibas,et al.  The Earth Mover's Distance as a Metric for Image Retrieval , 2000, International Journal of Computer Vision.

[32]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[33]  Wenjing Lou,et al.  A new approach for random key pre-distribution in large-scale wireless sensor networks , 2006, Wirel. Commun. Mob. Comput..

[34]  Rama Chellappa,et al.  Discriminant Analysis for Recognition of Human Face Images (Invited Paper) , 1997, AVBPA.

[35]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[36]  Wenyuan Xu,et al.  Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[37]  David Sánchez,et al.  Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines , 2013, Inf. Sci..

[38]  Iain MacGill,et al.  Coordinated Scheduling of Residential Distributed Energy Resources to Optimize Smart Home Energy Services , 2010, IEEE Transactions on Smart Grid.

[39]  Diane J. Cook,et al.  Learning Setting-Generalized Activity Models for Smart Spaces , 2012, IEEE Intelligent Systems.

[40]  Basel Alomair,et al.  Statistical Framework for Source Anonymity in Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[41]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[42]  K. Courtney Privacy and Senior Willingness to Adopt Smart Home Information Technology in Residential Care Facilities , 2008, Methods of Information in Medicine.

[43]  David W. Jacobs,et al.  Approximate earth mover’s distance in linear time , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.