Energy-efficient privacy protection for smart home environments using behavioral semantics

Research output: Contribution to journalArticlepeer-review

27 Scopus citations

Abstract

Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks.

Original languageEnglish
Pages (from-to)16235-16257
Number of pages23
JournalSensors
Volume14
Issue number9
DOIs
StatePublished - 2 Sep 2014

Bibliographical note

Publisher Copyright:
© 2014 by the authors; licensee MDPI, Basel, Switzerland.

Keywords

  • Activities of daily living
  • Privacy
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Energy-efficient privacy protection for smart home environments using behavioral semantics'. Together they form a unique fingerprint.

Cite this