Non-invasive sensor solutions for activity recognition in smart homes

Smart home sensor systems that infer residents' activities enable a number of exciting medical monitoring and energy conservation applications. Existing home activity recognition systems are invasive, since they require significant manual effort from the end user in installing or training the system, inconvenience the resident by requiring them to constantly wear tags, or require invasive cameras or expensive sensors. Our main hypothesis is that by effectively using data fusion techniques, leveraging the existing smart meter infrastructure in homes, and using only weak biometric sensing, we can build convenient, accurate home activity recognition solutions for the end user. The key challenges for home activity recognition systems addressed in this dissertation include reducing configuration effort from the end user, reducing sensor installation effort, and identifying residents in multi-person homes without using invasive sensors. To reduce user configuration effort, we develop an unsupervised activity recognition algorithm called AUTOLABEL that leverages data fusion and cross-home activity models to accurately recognize resident activities without user training. To eliminate many direct sensors in the home for activity recognition, we develop effective Bayesian data fusion techniques, which combine the existing smart meter infrastructure in homes, with one low cost, non-invasive sensor per room. In our WaterSense approach, we combine a single smart water meter per home, with an occupancy sensor per room to eliminate direct sensors on individual water fixtures. In our LightSense approach, we combine a single smart energy meter per home with a light sensor per room, to eliminate direct sensors on individual light fixtures. Finally, we propose the use of resident height, which is a weak biometric, in an effective data fusion approach, to identify residents for activity recognition in multi-person homes. We evaluate our proposed activity recognition solutions through short term prototype sensor deployments in home environments lasting from 7 to 10 days each. We show that our low cost, convenient solutions satisfy the activity recognition needs of numerous smart home applications, such as remote medical monitoring for elderly residents, and fine-grained resource consumption monitoring of light and water fixtures in the home. Finally, we observe that our unsupervised activity recognition algorithm can be used in a wireless snoop attack on smart homes, to infer the residents' daily activities with high accuracy in spite of encrypted wireless transmissions. We propose and evaluate a suite of privacy solutions to mitigate the inference accuracy of such an attack without affecting the performance or functionality of the home activity recognition system.

[1]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[3]  Eric C. Larson,et al.  Disaggregated End-Use Energy Sensing for the Smart Grid , 2011, IEEE Pervasive Computing.

[4]  Andry Rakotonirainy,et al.  A Survey of Research on Context-Aware Homes , 2003, ACSW.

[5]  Mani B. Srivastava,et al.  NAWMS: nonintrusive autonomous water monitoring system , 2008, SenSys '08.

[6]  Jennifer Healey,et al.  A Long-Term Evaluation of Sensing Modalities for Activity Recognition , 2007, UbiComp.

[7]  Les E. Atlas,et al.  A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home , 2011, Pervasive.

[8]  Mani B. Srivastava,et al.  ViridiScope: design and implementation of a fine grained power monitoring system for homes , 2009, UbiComp.

[9]  Andreas Savvides,et al.  Estimating building consumption breakdowns using ON/OFF state sensing and incremental sub-meter deployment , 2010, SenSys '10.

[10]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[11]  Rama Chellappa,et al.  Machine Recognition of Human Activities: A Survey , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Masahiro Inoue,et al.  A Home Automation System , 1985, IEEE Transactions on Consumer Electronics.

[13]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[14]  Kamin Whitehouse,et al.  Using Height Sensors for Biometric Identification in Multi-resident Homes , 2010, Pervasive.

[15]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[16]  Toshio Hirotsu,et al.  Proximity mining: finding proximity using sensor data history , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[17]  James Fogarty,et al.  Sensing from the basement: a feasibility study of unobtrusive and low-cost home activity recognition , 2006, UIST.

[18]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[19]  Irfan A. Essa,et al.  Exploiting human actions and object context for recognition tasks , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[20]  Eric C. Larson,et al.  GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home , 2010, Pervasive.

[21]  M. Csíkszentmihályi,et al.  The experience of psychopathology: Investigating mental disorders in their natural settings. , 1992 .

[22]  Alan D. Smith,et al.  Exploring the acceptability of biometrics and fingerprint technologies , 2005, Int. J. Serv. Stand..

[23]  Rachel R. Stoiko The Health and Retirement Study , 2014, International journal of aging & human development.

[24]  M. D. Addlesee,et al.  The ORL Active Floor , 1997 .

[25]  Matthai Philipose,et al.  Unsupervised Activity Recognition Using Automatically Mined Common Sense , 2005, AAAI.

[26]  Gregory M. P. O'Hare,et al.  Evaluation of energy-efficiency in lighting systems using sensor networks , 2009, BuildSys '09.

[27]  Michel Barbeau,et al.  Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.

[28]  Gwenn Englebienne,et al.  Accurate activity recognition in a home setting , 2008, UbiComp.

[29]  Robert Harle,et al.  Pedestrian localisation for indoor environments , 2008, UbiComp.

[30]  Gerhard P. Hancke,et al.  Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.

[31]  P. Mayer Residential End Uses of Water , 1999 .

[32]  Gregory D. Abowd,et al.  At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line (Nominated for the Best Paper Award) , 2007, UbiComp.

[33]  Shwetak N. Patel,et al.  ElectriSense: single-point sensing using EMI for electrical event detection and classification in the home , 2010, UbiComp.

[34]  G. W. Hart,et al.  Nonintrusive appliance load monitoring , 1992, Proc. IEEE.

[35]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[36]  Carla Schlatter Ellis,et al.  Using Ground Reaction Forces from Gait Analysis: Body Mass as a Weak Biometric , 2007, Pervasive.

[37]  Kamin Whitehouse,et al.  The smart thermostat: using occupancy sensors to save energy in homes , 2010, SenSys '10.

[38]  Ling Bao,et al.  A context-aware experience sampling tool , 2003, CHI Extended Abstracts.

[39]  David R. Cheriton,et al.  Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.

[40]  Predrag V. Klasnja,et al.  Exploring Privacy Concerns about Personal Sensing , 2009, Pervasive.

[41]  R.N. Murty,et al.  CitySense: An Urban-Scale Wireless Sensor Network and Testbed , 2008, 2008 IEEE Conference on Technologies for Homeland Security.

[42]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[43]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[44]  Sencun Zhu,et al.  Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.

[45]  Markus G. Kuhn,et al.  Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.

[46]  Chaouki Kasmi,et al.  Voice Biometrics , 2011, Encyclopedia of Cryptography and Security.

[47]  Kamin Whitehouse,et al.  Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.

[48]  Christopher G. Atkeson,et al.  Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors , 2005, Pervasive.

[49]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[50]  Eric C. Larson,et al.  HydroSense: infrastructure-mediated single-point sensing of whole-home water activity , 2009, UbiComp.

[51]  Sunny Consolvo,et al.  Using the Experience Sampling Method to Evaluate Ubicomp Applications , 2003, IEEE Pervasive Comput..

[52]  Matt Welsh,et al.  Sensor networks for medical care , 2005, SenSys '05.

[53]  Matthai Philipose,et al.  Hands-on RFID: wireless wearables for detecting use of objects , 2005, Ninth IEEE International Symposium on Wearable Computers (ISWC'05).

[54]  Gang Zhou,et al.  VigilNet: An integrated sensor network system for energy-efficient surveillance , 2006, TOSN.

[55]  John A. Stankovic,et al.  ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring , 2006 .

[56]  Kamin Whitehouse,et al.  The hitchhiker's guide to successful residential sensing deployments , 2011, SenSys.

[57]  Emmanuel,et al.  Activity recognition in the home setting using simple and ubiquitous sensors , 2003 .

[58]  Trevor Darrell,et al.  Integrated face and gait recognition from multiple views , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[59]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[60]  Matt Welsh,et al.  MoteTrack: a robust, decentralized approach to RF-based location tracking , 2006, Personal and Ubiquitous Computing.

[61]  Gregory D. Abowd,et al.  PowerLine Positioning: A Practical Sub-Room-Level Indoor Location System for Domestic Use , 2006, UbiComp.

[62]  Kamin Whitehouse,et al.  WaterSense: water flow disaggregation using motion sensors , 2011, BuildSys '11.

[63]  Tadayoshi Kohno,et al.  Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing , 2007, USENIX Security Symposium.

[64]  Larry S. Davis,et al.  Person identification using automatic height and stride estimation , 2002, Object recognition supported by user interaction for service robots.

[65]  Anthony Rowe,et al.  Contactless sensing of appliance state transitions through variations in electromagnetic fields , 2010, BuildSys '10.

[66]  Ling Bao,et al.  Activity Recognition from User-Annotated Acceleration Data , 2004, Pervasive.

[67]  Kamin Whitehouse,et al.  The self-programming thermostat: optimizing setback schedules based on home occupancy patterns , 2009, BuildSys '09.

[68]  David E. Culler,et al.  Design and implementation of a high-fidelity AC metering network , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[69]  Liang Zhang,et al.  Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[70]  Christopher James Jenkins,et al.  The Weakly Identifying System for Doorway Monitoring , 2007 .

[71]  Gregory D. Abowd,et al.  TrackSense: Infrastructure Free Precise Indoor Positioning Using Projected Patterns , 2007, Pervasive.

[72]  Y. Nishida,et al.  Minimally privacy-violative human location sensor by ultrasonic radar embedded on ceiling , 2004, Proceedings of IEEE Sensors, 2004..

[73]  John A. Stankovic,et al.  Empath: a continuous remote emotional health monitoring system for depressive illness , 2011, Wireless Health.

[74]  Roman Lim Wireless Fire Sensor Network Demonstrator , 2006 .

[75]  M. Csíkszentmihályi,et al.  Validity and Reliability of the Experience‐Sampling Method , 1987, The Journal of nervous and mental disease.

[76]  Harold W. Kuhn,et al.  The Hungarian method for the assignment problem , 1955, 50 Years of Integer Programming.

[77]  Joshua R. Smith,et al.  RFID-based techniques for human-activity detection , 2005, Commun. ACM.

[78]  A. Glascock,et al.  Behavioral Telemedicine: A New Approach to the Continuous Nonintrusive Monitoring of Activities of Daily Living , 2000 .

[79]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[80]  Laurie J. Heyer,et al.  Exploring expression data: identification and analysis of coexpressed genes. , 1999, Genome research.

[81]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.