[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Security and Privacy Protection in Visual Sensor Networks: A Survey

Published: 01 May 2014 Publication History

Abstract

Visual sensor networks (VSNs) are receiving a lot of attention in research, and at the same time, commercial applications are starting to emerge. VSN devices come with image sensors, adequate processing power, and memory. They use wireless communication interfaces to collaborate and jointly solve tasks such as tracking persons within the network. VSNs are expected to replace not only many traditional, closed-circuit surveillance systems but also to enable emerging applications in scenarios such as elderly care, home monitoring, or entertainment. In all of these applications, VSNs monitor a potentially large group of people and record sensitive image data that might contain identities of persons, their behavior, interaction patterns, or personal preferences. These intimate details can be easily abused, for example, to derive personal profiles.
The highly sensitive nature of images makes security and privacy in VSNs even more important than in most other sensor and data networks. However, the direct use of security techniques developed for related domains might be misleading due to the different requirements and design challenges. This is especially true for aspects such as data confidentiality and privacy protection against insiders, generating awareness among monitored people, and giving trustworthy feedback about recorded personal data—all of these aspects go beyond what is typically required in other applications.
In this survey, we present an overview of the characteristics of VSN applications, the involved security threats and attack scenarios, and the major security challenges. A central contribution of this survey is our classification of VSN security aspects into data-centric, node-centric, network-centric, and user-centric security. We identify and discuss the individual security requirements and present a profound overview of related work for each class. We then discuss privacy protection techniques and identify recent trends in VSN security and privacy. A discussion of open research issues concludes this survey.

References

[1]
Najwa Aaraj, Anand Raghunathan, and Niraj K. Jha. 2008. Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Transactions on Embedded Computing Systems 8, 1, 1--31.
[2]
Hamid Aghajan, Juan Carlos Augusto, Chen Wu, Paul Mccullagh, and Julie-Ann Walkden. 2007. Distributed vision-based accident management for assisted living. In Proceedings of the International Conference on Smart Homes and Health Telematics. 196--205.
[3]
Kwabene W. Agyeman and Anthony Rowe. 2012. CMUcam4 Feature List. Technical Report.
[4]
Ian F. Akyildiz, Tommaso Melodia, and Kaushik R. Chowdhury. 2007. A survey on wireless multimedia sensor networks. Computer Networks 51, 4, 921--960.
[5]
M. G. Albanesi, M. Ferretti, and F. Guerrini. 2001. A taxonomy for image authentication techniques and its application to the current state of the art. In Proceedings of the International Conference on Image Analysis and Processing. 535--540.
[6]
Hani Alzaid, Ernest Foo, and Juan Gonzales Nieto. 2007. Secure data aggregation in wireless sensor network: A survey. In Proceedings of the Australasian Information Security Conference. 13.
[7]
ARM Limited. 2009. ARM Security Technology: Building a Secure System Using TrustZone Technology. Technical Report.
[8]
Clemens Arth, Horst Bischof, and Christian Leistner. 2006. TRICam: An embedded platform for remote traffci surveillance. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop. 125--133.
[9]
Pradeep K. Atrey, Wei-Qi Yan, Ee-Chien Chang, and Mohan S. Kankanhalli. 2004. A hierarchical signature scheme for robust video authentication using secret sharing. In Proceedings of the International Conference on Multimedia Modelling. 330--337.
[10]
Pradeep K. Atrey, Wei-Qi Yan, and Mohan S. Kankanhalli. 2006. A scalable signature scheme for video authentication. Multimedia Tools and Applications 34, 1, 107--135.
[11]
Jerome Azema and Gilles Fayad. 2008. M-Shield Mobile Security Technology: Making Wireless Secure. Technical Report. Texas Instruments.
[12]
Nadia Baaziz, Nathalie Lolo, Oscar Padilla, and Felix Petngang. 2007. Security and privacy protection for automated video surveillance. In Proceedings of the International Symposium on Signal Processing and Information Technology. 17--22.
[13]
Athanasios Bamis, Dimitrios Lymberopoulos, Thiago Teixeira, and Andreas Savvides. 2010. The BehaviorScope framework for enabling ambient assisted living. Personal and Ubiquitous Computing 14, 6 (March 2010), 473--487.
[14]
Franco Bartolini, Anastasios Tefas, Mauro Barni, and Ioannis Pitas. 2001. Image authentication techniques for surveillance applications. Proceedings of the IEEE 89, 10, 1403--1418.
[15]
Horst Bischof, Martin Godec, Christian Leistner, Bernhard Rinner, and Andreas Starzacher. 2010. Autonomous audio-supported learning of visual classifiers for traffic monitoring. IEEE Intelligent Systems 25, 3, 15--23.
[16]
Azzedine Boukerche and Damla Turgut. 2007. Secure time synchronization protocols for wireless sensor networks. IEEE Wireless Communications 14, 5, 64--69.
[17]
Terrance Edward Boult. 2005. PICO: Privacy through invertible cryptographic obscuration. In Proceedings of the Workshop on Computer Vision for Interactive and Intelligent Environments. 27--38.
[18]
Michael Boyle, Christopher Edwards, and Saul Greenberg. 2000. The effects of filtered video on awareness and privacy. In Proceedings of the Conference on Computer Supported Cooperative Work. 1--10.
[19]
Michael Bramberger, Josef Brunner, Bernhard Rinner, and Helmut Schwabach. 2004. Real-time video analysis on an embedded smart camera for traffic surveillance. In IEEE Real-Time and Embedded Technology and Applications Symposium. 174--181.
[20]
Jack Brassil. 2005. Using mobile communications to assert privacy from video surveillance. In Proceedings of the Parallel and Distributed Processing Symposium. 8.
[21]
William M. Bulkeley. 2009. Chicago's Camera Network Is Everywhere. Retrieved March 2012 from http://online.wsj.com/article/SB100014240527487045384045745399104128247 56.html.
[22]
Claude Castelluccia, Aldar C-F. Chan, Einar Mykletun, and Gene Tsudik. 2009. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks 5, 3 (May 2009), 1--36.
[23]
Andrea Cavallaro. 2004. Adding privacy constraints to video-based applications. In Proceedings of the European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology. 8.
[24]
Andrea Cavallaro. 2007. Privacy in video surveillance. IEEE Signal Processing Magazine 24, 2 (March 2007), 168--169.
[25]
Ann Cavoukian. 2013a. Privacy by Design Centre of Excellence. Ph.D. Dissertation. Information & Privacy Commissioner Ontario, Canada.
[26]
Ann Cavoukian. 2013b. Surveillance, Then and Now: Securing Privacy in Public Spaces. Technical Report.
[27]
Haowen Chan and Adrian Perrig. 2003. Security and privacy in sensor networks. IEEE Computer 36, 10, 103--105.
[28]
Haowen Chan, Adrian Perrig, and Dawn Song. 2006. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of the International Conference on Computer and Communications Security. 1--10.
[29]
Ankur Chattopadhyay and Terrance Edward Boult. 2007. PrivacyCam: A privacy preserving camera using uCLinux on the Blackfin DSP. In Proceedings of the International Conference on Computer Vision and Pattern Recognition. 1--8.
[30]
Datong Chen, Yi Chang, Rong Yan, and Jie Yang. 2007. Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Applied Signal Processing 2007, 1, 107--116.
[31]
Mo Chen, Jessica Fridrich, Miroslav Goljan, and Jan Lukás. 2008. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 3, 1, 74--90.
[32]
Phoebus Wei-Chih Chen, Parvez Ahammad, Colby Boyer, Shih-I Huang, Leon Lin, Edgar J. Lobaton, Marci Lenore Meingast, Songhwai Oh, Simon Wang, Posu Yan, Allen Yang, Chuohao Yeo, Lung-Chung Chang, Doug Tygar, and S. Shankar Sastry. 2008. CITRIC: A low-bandwidth wireless camera network platform. In Proceedings of the International Conference on Distributed Smart Cameras. 10.
[33]
Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou. 2009. Sensor network security: A survey. IEEE Communications Surveys and Tutorials 11, 2, 52--73.
[34]
Sen-Ching Samson Cheung, Jithendra K. Paruchuri, and Thinh P. Nguyen. 2008. Managing privacy data in pervasive camera networks. In Proceedings of the International Conference on Image Processing. 1676--1679.
[35]
Sen-Ching Samson Cheung, Jian Zhao, and M Vijay Venkatesh. 2006. Efficient object-based video inpainting. In Proceedings of the International Conference on Image Processing. 705--708.
[36]
Kenta Chinomi, Naoko Nitta, Yoshimichi Ito, and Noboru Babaguchi. 2008. PriSurv: Privacy protected video surveillance system using adaptive visual abstraction. In Proceedings of the International Multimedia Modeling Conference. 144--154.
[37]
Rita Cucchiara, Massimo Piccardi, and Paola Mello. 2000. Image analysis and rule-based reasoning for a traffic monitoring system. IEEE Transactions on Intelligent Transportation Systems 1, 2 (June 2000), 119--130.
[38]
Jing Deng, R. Han, and Shivakant Mishra. 2006. INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications 29, 2 (January 2006), 216--230.
[39]
Tim Dierks and Christopher Allen. 1999. RFC 2246: The TLS Protocol. Retrieved April 2014 from http://www.ietf.org/rfc/rfc2246.txt.
[40]
Kurt Dietrich and Johannes Winter. 2009. Implementation aspects of mobile and embedded trusted computing. In Proceedings of the International Conference on Trust and Trustworthy Computing. 29--44.
[41]
Kurt Dietrich and Johannes Winter. 2010. Towards customizable, application specific mobile trusted modules. In Proceedings of the Workshop on Scalable Trusted Computing. 31--40.
[42]
Akshay Dua, Nirupama Bulusu, Wu-Chang Feng, and Wen Hu. 2009. Towards trustworthy participatory sensing. In Proceedings of the USENIX Workshop on Hot Topics in Security. 6.
[43]
Frédéric Dufaux and Touradj Ebrahimi. 2006. Scrambling for video surveillance with privacy. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop. 160--166.
[44]
Frédéric Dufaux and Touradj Ebrahimi. 2010. A framework for the validation of privacy protection solutions in video surveillance. In Proceedings of the International Conference on Multimedia and Expo. 66--71.
[45]
Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, and Marko Wolf. 2007. Reconfigurable trusted computing in hardware. In Proceedings of the Workshop on Scalable Trusted Computing. 15--20.
[46]
Jan-Erik Ekberg and Markus Kylänpää. 2007. Mobile Trusted Module (MTM)—An Introduction. Technical Report NRC-TR-2007-015. Nokia Research Center.
[47]
Jeremy Elson and Kay Römer. 2002. Wireless sensor networks: A new regime for time synchronization. In Proceedings of the Workshop on Hot Topics in Networks. 6.
[48]
Ádám Erdélyi, Thomas Winkler, and Bernhard Rinner. 2013. Serious fun: Cartooning for privacy protection. In Proceedings of the MediaEval Workshop. 2.
[49]
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, and Tomas Toft. 2009. Privacy-preserving face recognition. In Proceedings of the International Symposium on Privacy Enhancing Technologies. 235--253.
[50]
Zekeriya Erkin, Alessandro Piva, Stefan Katzenbeisser, R. L. Lagendijk, Jamshid Shokrollahi, Gregory Neven, and Mauro Barni. 2007. Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security 2007, 20.
[51]
Dan Farmer and Charles C. Mann. 2003. Surveillance nation (part I). Technology Review 4, 34--43.
[52]
Douglas A. Fidaleo, Hoang-Anh Nguyen, and Mohan Trivedi. 2004. The Networked Sensor Tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In Proceedings of the International Workshop on Video Surveillance and Sensor Networks. 46--53.
[53]
Sven Fleck and Wolfgang Straßer. 2008. Smart camera based monitoring system and its application to assisted living. Proceedings of the IEEE 96, 10, 1698--1714.
[54]
Sven Fleck and Wolfgang Straßer. 2010. Towards secure and privacy sensitive surveillance. In Proceedings of the International Conference on Distributed Smart Cameras. 7.
[55]
Gary L. Friedman. 1993. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics 39, 4, 905--910.
[56]
Saurabh Ganeriwal, Ram Kumar, and Mani B. Srivastava. 2003. Time-sync protocols for sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems. 12.
[57]
Saurabh Ganeriwal, Christina Pöepper, Srdjan Capkun, and Mani B. Srivastava. 2008. Secure time synchronization in sensor networks. ACM Transactions on Sensor Networks 11, 4, 1--35.
[58]
Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, and Jürgen Becker. 2008a. A system architecture for reconfigurable trusted platforms. In Proceedings of the Conference on Design, Automation and Test in Europe. 541--544.
[59]
Benjamin Glas, Alexander Klimm, David Schwab, Klaus D. Müller-Glaser, and Jürgen Becker. 2008b. A prototype of trusted platform functionality on reconfigurable hardware for bitstream updates. In Proceedings of the International Symposium on Rapid System Prototyping. 135--141.
[60]
Ralph Gross, Latanya Sweeney, Fernando De Torre, and Simon Baker. 2006. Model-based face de-identification. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop. 8.
[61]
Ulrich Grossmann, Enrik Berkhan, Luciana C. Jatoba, Joerg Ottenbacher, Wilhelm Stork, and Klaus D. Müller-Glaser. 2007. Security for mobile low power nodes in a personal area network by means of trusted platform modules. In Proceedings of the Workshop on Security and Privacy in Ad Hoc and Sensor Networks. 172--186.
[62]
Arun Hampapur. 2008. Smart video surveillance for proactive security. IEEE Signal Processing Magazine 25, 4 (July 2008), 134--136.
[63]
Arun Hampapur, S. Borger, Lisa Brown, C. Carlson, Jonathan Connell, Max Lu, Andrew Senior, V. Reddy, Chiao Fe Shu, and Ying-Li Tian. 2007. S3: The IBM smart surveillance system: From transactional systems to observational systems. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing. 1385--1388.
[64]
HART Communication Foundation. 2010. WirelessHART Security Overview. Retrieved October 2013 from http://www.hartcomm.org/.
[65]
Dajun He, Qibin Sun, and Qi Tian. 2004. A secure and robust object-based video authentication system. EURASIP Journal on Advances in Signal Processing 2004, 14, 2185--2200.
[66]
Frank Helten and Bernd Fischer. 2004. What Do People Think about CCTV? Findings from a Berlin Survey. Technical Report. Berlin Institute for Social Research.
[67]
Martin Hoffmann, Michael Wittke, Yvonne Bernard, Ramin Soleymani, and Jörg Hähner. 2008. DMCTRAC: Distributed multi camera tracking. In Proceedings of the International Conference on Distributed Smart Cameras. 10.
[68]
Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei. 2011. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. In Proceedings of SPIE. 12.
[69]
Wen Hu, Peter Corke, Wen Chan Shih, and Leslie Overs. 2009. secFleck: A public key technology platform for wireless sensor networks. In Proceedings of the European Conference on Wireless Sensor Networks. 296--311.
[70]
Wen Hu, Hailun Tan, Peter Corke, Wen Chan Shih, and Sanjay Jha. 2010. Toward trusted wireless sensor networks. ACM Transactions on Sensor Networks 7, 1 (August 2010), 25.
[71]
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. 2005. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11, 1--2 (January 2005), 21--38.
[72]
ISA100 Wireless Compliance Institute. 2011. ISA-100.11.a Wireless Standard. Retrieved October 2013 from http://www.isa100wci.org/.
[73]
Peyman Kabiri and Ali A. Ghorbani. 2005. Research on intrusion detection and response: A survey. International Journal of Network Security 1, 2, 84--102.
[74]
Chris Karlof, Neveen Sastry, and David Wagner. 2004. TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems. 162--175.
[75]
Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1, 2--3, 293--315.
[76]
Vladimir Katalov. 2011. Nikon Image Authentication System: Compromised. Retrieved March 2012 from http://www.elcomsoft.com/nikon.html.
[77]
Pavel Korshunov, C. Araimo, Francesca Desimone Simone, C. Velardo, J.-L. Dugelay, and Touradj Ebrahimi. 2012a. Subjective study of privacy filters in video surveillance. In Proceedings of the International Workshop on Multimedia Signal Processing. 5.
[78]
Pavel Korshunov, Shuting Cai, and Touradj Ebrahimi. 2012b. Crowdsourcing approach for evaluation of privacy filters in video surveillance. In Proceedings of the International Workshop on Crowdsourcing for Multimedia. 6.
[79]
Pavel Korshunov and Touradj Ebrahimi. 2013. Using warping for privacy protection in video surveillance. In Proceedings of the International Conference on Digital Signal Processing. 6.
[80]
Kari Kostiainen, N. Asokan, and Jan-Erik Ekberg. 2011. Practical property-based attestation on mobile devices. In Proceedings of the International Conference on Trust and Trustworthy Computing. 78--92.
[81]
Stefan Krempl and Andreas Wilkens. 2011. Datenschützer beanstanden Videoüberwachung in ECE-Einkaufszentren.Retrieved March 2013 from http://heise.de/-1187205.
[82]
Reginald L. Lagendijk, Zekeriya Erkin, and Mauro Barni. 2013. Encrypted signal processing for privacy protection. IEEE Signal Processing Magazine 30, 1, 82--105.
[83]
Chang-tsun Li. 2010. Source camera identification using enhanced sensor pattern noise. IEEE Transactions on Information Forensics and Security 5, 2 (June 2010), 280--287.
[84]
Guangzhen Li, Yoshimichi Ito, Xiaoyi Yu, Naoko Nitta, and Noboru Babaguchi. 2009. Recoverable privacy protection for video content distribution. EURASIP Journal on Information Security 2009, 11.
[85]
Ying Luo, Shuiming Ye, and Sen-Ching Samson Cheung. 2010. Anonymous subject identification in privacy-aware video surveillance. In Proceedings of the International Conference on Multimedia and Expo. 83--88.
[86]
Michael Manzo, Tanya Roosta, and Shankar Sastry. 2005. Time synchronization attacks in sensor networks. In Proceedings of the Workshop on Security of Ad Hoc and Sensor Networks. 10.
[87]
Andrew Martin. 2008. The Ten Page Introduction to Trusted Computing. Technical Report RR-08-11. Oxford University Computing Laboratory.
[88]
Isabel Martínez-Ponte, Xavier Desurmont, Jerome Meessen, and Jean-François Delaigle. 2005. Robust human face hiding ensuring privacy. In Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services. 4.
[89]
Nasir Memon and Ping Wah Wong. 1998. Protecting digital media content. Communications of the ACM 41, 7 (July 1998), 35--43.
[90]
Christian Micheloni, Gian Luca Foresti, and Lauro Snidaro. 2005. A network of co-operative cameras for visual surveillance. IEEE Proceedings on Vision, Image and Signal Processing 152, 2, 205--212.
[91]
Saraju P. Mohanty. 2009. A secure digital camera architecture for integrated real-time digital rights management. Journal of Systems Architecture 55, 10--12 (October 2009), 468--480.
[92]
Simon Moncrieff, Svetha Venkatesh, and Geoff West. 2009. Dynamic privacy in public surveillance. IEEE Computer 42, 9 (September 2009), 22--28.
[93]
Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, and Grammati Pantziou. 2009. A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys and Tutorials 11, 4, 1--14.
[94]
Steven Ney and Kurt Pichler. 2002. Video Surveillance in Austria. Technical Report. Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria.
[95]
Clive Norris. 2009. A Review of the Increased Use of CCTV and Video-Surveillance for Crime Prevention Purposes in Europe. Technical Report. Department of Sociological Studies, University of Sheffield, United Kingdom.
[96]
Vladimir A. Oleshchuk. 2007. Privacy preserving monitoring and surveillance in sensor networks. In Proceedings of the Frontiers of High Performance Computing and Networking Workshops. Lecture Notes in Computer Science, Vol. 4743. 485--492.
[97]
OpenStreetMap.org. 2011. OpenStreetMap.org Video Surveillance Camera Overlay. Retrieved April 2011 from http://osm.vdska.de/.
[98]
Sddka Berna Örs, Gürkaynak Frank, Elisabeth Oswald, and Bart Preneel. 2004. Power-analysis attack on an ASIC AES implementation. In Proceedings of the International Conference on Information Technology: Coding and Computing. 2--8.
[99]
OWNI. 2011. CCTV Camera Positions in Paris. Retrieved March 2012 from http://app.owni.fr/camera-paris/.
[100]
Suat Ozdemir and Yang Xiao. 2009. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks 53, 12 (August 2009), 2022--2037.
[101]
Adrian Perrig, Ran Canetti, J. D. Tygar, and Dawn Song. 2002. The TESLA broadcast authentication protocol. RSA Cryptobytes 5.
[102]
Adrian Perrig, John A. Stankovic, and David Wagner. 2004. Security in wireless sensor networks. Communications of the ACM 47, 6, 53--57.
[103]
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler. 2002. SPINS: Security protocols for sensor networks. Wireless Networks 8, 5, 521--534.
[104]
Alvaro Pinto. 2011. Wireless Embedded Smart Cameras: Performance Analysis and Their Application to Fall Detection for Eldercare. Ph.D. Dissertation.
[105]
Thomas Popp, Stefan Mangard, and Elisabeth Oswald. 2007. Power analysis attacks and countermeasures. IEEE Design and Test of Computers 24, 6, 535--543.
[106]
Christina Pöpper, Mario Strasser, and Srdjan Capkun. 2010. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications 28, 5, 1--13.
[107]
Prefecture de Police. 2010. Plan de Vidéoprotection pour Paris. Technical Report.
[108]
Markus Quaritsch, Markus Kreuzthaler, Bernhard Rinner, Horst Bischof, and Bernhard Strobl. 2007. Autonomous multicamera tracking on embedded smart cameras. EURASIP Journal on Embedded Systems 2007, 1, 10.
[109]
Jean-Jacques Quisquater, Benoit Macq, Marc Joye, N. Degand, and A. Bernard. 1997. Practical solution to authentication of images with a secure camera. Storage and Retrieval for Image and Video Databases 3022, 1, 290--297.
[110]
Faisal Z. Qureshi. 2009. Object-video streams for preserving privacy in video surveillance. In Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance. 442--447.
[111]
Mohammad Rahimi, Rick Baer, Obimdinachi I. Iroezi, Juan C. Garcia, Jay Warrior, Deborah Estrin, and Mani B. Srivastava. 2005. Cyclops: In situ image sensing and interpretation in wireless sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems. 13.
[112]
Mizanur Rahman, M. Anwar Hossain, Hussein Mouftah, A. El Saddik, and Eiji Okamoto. 2010. A real-time privacy-sensitive data hiding approach based on chaos cryptography. In Proceedings of the International Conference on Multimedia and Expo. 72--77.
[113]
David R. Raymond, Scott F. Midkiff, Anthony Wood, and John A. Stankovic. 2008. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing 7, 1, 74--81.
[114]
Shahid Raza, Adriaan Slabbert, Thiemo Voigt, and Krister Landernas. 2009. Security considerations for the WirelessHART protocol. In Proceedings of the International Conference on Emerging Technologies and Factory Automation. 8.
[115]
Bernhard Rinner and Wayne Wolf. 2008. A bright future for distributed smart cameras. Proceedings of the IEEE 96, 10 (October 2008), 1562--1564.
[116]
Anthony Rowe, Dhiraj Goel, and Raj Rajkumar. 2007. FireFly mosaic: A vision-enabled wireless sensor networking system. In Proceedings of the International Real-Time Systems Symposium. 459--468.
[117]
F. Sabahi and A. Movaghar. 2008. Intrusion detection: A survey. In Proceedings of the International Conference on Systems and Networks Communications. 23--26.
[118]
Mukesh Saini, Pradeep K. Atrey, Sharad Mehrotra, Sabu Emmanuel, and Mohan S. Kankanhalli. 2010. Privacy modeling for video data publication. In Proceedings of the International Conference on Multimedia and Expo. 60--65.
[119]
Mukesh Saini, Pradeep K. Atrey, Sharad Mehrotra, and Mohan S. Kankanhalli. 2012. Adaptive transformation for robust privacy protection in video surveillance. Advances in Multimedia, 1--10.
[120]
Kimaya Sanzgiri, Daniel Laflamme, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer. 2005. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications 23, 3, 598--610.
[121]
Martin Schaffer and Peter Schartner. 2007. Video surveillance: A distributed approach to protect privacy. In Proceedings of the International Conference on Communications and Multimedia Security. 140--149.
[122]
Jeremy Schiff, Marci Meingast, Deirdre K. Mulligan, Shankar Sastry, and Kenneth Y. Goldberg. 2007. Respectful cameras: Selecting visual markers in real-time to address privacy concerns. In Proceedings of the International Conference on Intelligent Robots and Systems. 971--978.
[123]
Adolph Seema and Martin Reisslein. 2011. Towards efficient wireless video sensor networks: A survey of existing node architectures and proposal for a Flexi-WVSNP design. IEEE Communications Surveys and Tutorials 13, 3, 462--486.
[124]
Jaydip Sen. 2010. A survey on wireless sensor network security. International Journal of Communication Networks and Information Security 1, 2 (November 2010), 55--78.
[125]
Andrew Senior, Sharath Pankanti, Arun Hampapur, Lisa Brown, Ying-Li Tian, Ahmet Ekin, Jonathan Connell, Chiao Fe Shu, and Max Lu. 2005. Enabling video privacy through computer vision. IEEE Security and Privacy Magazine 3, 3, 50--57.
[126]
Dimitrios N. Serpanos and Andreas Papalambrou. 2008. Security and privacy in distributed smart cameras. Proceedings of the IEEE 96, 10 (October 2008), 1678--1687.
[127]
Stefaan Seys, Claudia Diaz, Bart De Win, Vincent Naessens, Caroline Goemans, Joris Claessens, Wim Moreau, Bart De Decker, Jos Dumortier, and Bart Preneel. 2001. APES Anonymity and Privacy in Electronic Services. Technical Report.
[128]
Pavan Sikka, Peter Corke, Leslie Overs, Philip Valencia, and Tim Wark. 2007. Fleck: A platform for real-world outdoor sensor networks. In Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information. 709--714.
[129]
Dmitry Sklyarov. 2010. Forging Canon Original Decision Data. Retrieved April 2011 from http://www.elcomsoft.com/canon.html.
[130]
Hui Song, Sencun Zhu, and Guohong Cao. 2007. Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5, 1 (January 2007), 112--125.
[131]
Stanislava Soro and Wendi B. Heinzelman. 2009. A survey of visual sensor networks. Advances in Multimedia 2009 (May 2009), 21.
[132]
Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc van Gool, and Andreas Steffen. 2006. Privacy in video surveilled areas. In Proceedings of the International Conference on Privacy, Security and Trust. 10.
[133]
Kun Sun, Peng Ning, Cliff Wang, An Liu, and Yuzheng Zhou. 2006. TinySeRSync: Secure and resilient time synchronization in wireless sensor networks. In Proceedings of the Conference on Computer and Communications Security. 14.
[134]
Bharath Sundararaman, Ugo Buy, and Ajay D. Kshemkalyani. 2005. Clock synchronization for wireless sensor networks: A survey. Ad Hoc Networks 3, 4, 281--323.
[135]
Y. Sutcu, S. Bayram, H. T. Sencar, and Nasir Memon. 2007. Improvements on sensor noise based source camera identification. In Proceedings of the International Conference on Multimedia and Expo. 24--27.
[136]
Hailun Tan, Wan Hu, and Sanjay Jha. 2010. A hardware-based remote attestation protocol in wireless sensor networks. In Proceedings of the International Conference on Information Processing in Sensor Networks. 378--379.
[137]
Suriyon Tansuriyavong and Shinichi Hanaki. 2001. Privacy protection by concealing persons in circumstantial video image. In Proceedings of the Workshop on Perceptive User Interfaces. 4.
[138]
Kinh Tieu, Gerald Dalley, and W. Eric L. Grimson. 2005. Inference of non-overlapping camera network topology by measuring statistical dependence. In Proceedings of the International Conference on Computer Vision. 1842--1849.
[139]
Juan R. Troncoso-Pastoriza, Luis Pérez-Freire, and Fernando Pérez-González. 2009. Videosurveillance and privacy: Covering the two sides of the mirror with DRM. In Proceedings of the Workshop on Digital Rights Management. 83--94.
[140]
Khai N. Truong, Shwetak N. Patel, Jay W. Summet, and Gregory D. Abowd. 2005. Preventing camera recording by designing a capture-resistant environment. In Proceedings of the International Conference on Ubiquitous Computing. 73--86.
[141]
Trusted Computing Group. 2011. TPM Main Specification 1.2, Level 2, Revision 116. Retrieved October 2013 from http://www.trustedcomputinggroup.org/resources/tpm_main_specification.
[142]
Hauke Vagts and Alexander Bauer. 2010. Privacy-aware object representation for surveillance systems. In Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance. 601--608.
[143]
Hauke Vagts and Jürgen Beyerer. 2009. Security and privacy challenges in modern surveillance systems. In Proceedings of the Future Security Research Conference. 94--116.
[144]
Senem Velipasalar, Jason Schlessman, Cheng-yao Chen, Wayne Wolf, and Jaswinder Pal Singh. 2006. SCCS: A scalable clustered camera system for multiple object tracking communicating via message passing interface. In Proceedings of the International Conference on Multimedia and Expo. 277--280.
[145]
David Wagner. 2004. Resilient aggregation in sensor networks. In Proceedings of the Workshop on Security of Ad Hoc and Sensor Networks. 10.
[146]
Yong Wang, Garhan Attebury, and Byrav Ramamurthy. 2006. A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials 8, 2, 2--23.
[147]
Dirk Westhoff, Joao Girao, and Mithun Acharya. 2006. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing 5, 10, 1417--1431.
[148]
Jehan Wickramasuriya, Mahesh Datt, Sharad Mehrotra, and Nalini Venkatasubramanian. 2004. Privacy protecting data collection in media spaces. In Proceedings of the International Conference on Multimedia. 48--55.
[149]
Thomas Winkler and Bernhard Rinner. 2010a. TrustCAM: Security and privacy-protection for an embedded smart camera based on trusted computing. In Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance. 593--600.
[150]
Thomas Winkler and Bernhard Rinner. 2010b. User-based attestation for trustworthy visual sensor networks. In Proceedings of the International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. 8.
[151]
Thomas Winkler and Bernhard Rinner. 2011. Securing embedded smart cameras with trusted computing. EURASIP Journal on Wireless Communications and Networking 2011, 20.
[152]
Thomas Winkler and Bernhard Rinner. 2012. User centric privacy awareness in video surveillance. Multimedia Systems Journal 18, 2, 99--121.
[153]
Thomas Winkler and Bernhard Rinner. 2013. Sensor-level security and privacy protection by embedding video content analysis. In Proceedings of the International Conference on Digital Signal Processing. 6.
[154]
Johannes Winter. 2008. Trusted computing building blocks for embedded Linux-based arm trustzone platforms. In Proceedings of the Workshop on Scalable Trusted Computing. 21--30.
[155]
Wayne Wolf, Burak Ozer, and Tiehan Lv. 2003. Architectures for distributed smart cameras. In Proceedings of the International Conference on Multimedia and Expo. 5--8.
[156]
Wenyuan Xu, Ke Ma, Wade Trappe, and Yanyong Zhang. 2006. Jamming sensor networks: Attack and defense strategies. IEEE Network 20, 3, 41--47.
[157]
Kenichi Yabuta, Hitoshi Kitazawa, and Toshihisa Tanaka. 2005. A new concept of security camera monitoring with privacy protection by masking moving objects. In Proceedings of the International Pacific-Rim Conference on Multimedia. 831--842.
[158]
Shuiming Ye, Ying Luo, Jian Zhao, and Sen-Ching Samson Cheung. 2009. Anonymous biometric access control. EURASIP Journal on Information Security 2009, 18.
[159]
Suyoung Yoon, Chanchai Veerarittiphan, and Mihail L. Sichitiu. 2007. Tiny-sync: Tight time synchronization for wireless sensor networks. ACM Transactions on Sensor Networks 3, 2, 1--33.
[160]
Yun Zhou, Yuguang Fang, and Yanchao Zhang. 2008. Securing wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials 10, 3, 6--28.
[161]
Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. 2006. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2, 4, 500--528.
[162]
ZigBee Alliance. 2012. ZigBee Consortium Web Site. Retrieved October 2013 from http://www.zigbee.org/.

Cited By

View all
  • (2024)Improved Digital Security Applications for Smart CardInternational Journal of Research In Science & Engineering10.55529/ijrise.42.11.18(11-18)Online publication date: 1-Feb-2024
  • (2024)Privacy Preserving Data Analysis With Generative AIAI Techniques for Securing Medical and Business Practices10.4018/979-8-3693-8939-3.ch014(391-410)Online publication date: 13-Sep-2024
  • (2024)Beyond Current CryptographyInnovations in Modern Cryptography10.4018/979-8-3693-5330-1.ch001(1-30)Online publication date: 12-Jul-2024
  • Show More Cited By

Index Terms

  1. Security and Privacy Protection in Visual Sensor Networks: A Survey

      Recommendations

      Reviews

      Soon Ae Chun

      Visual sensor networks (VSNs) consist of devices with image sensors and with processing and networking capabilities, to monitor large quantities of images of people, automobiles, and so on. VSNs amplify the core nature of the surveillance society with widespread application areas such as environmental monitoring, smart homes and meeting rooms, elder care, and assisted living. The network of cameras can collect data that can be analyzed to identify the identities, behaviors, interaction patterns, and personal preferences of individuals. A proper set of security and privacy mechanisms should be understood and implemented for the VSNs. The authors use a holistic approach by categorizing the security requirements and related studies by each component in the VSN, namely, node-centric security, data-centric security, network-centric security, as well as user-centric security. Data-centric security requirements include nonrepudiation and confidentiality, thus protection approaches address data confidentiality, integrity, authenticity, as well as correct timestamping and location requirements. The data-level approaches also address privacy and access authorization to meet the confidentiality requirements. The node-centric security approaches address availability, physical security, and code security requirements. The network-centric security approaches try to address channel security with the network data confidentiality, integrity, availability, and freshness security requirements, as well as the collaboration security requirements to prevent routing attacks, time synchronization attacks, data sharing, and aggregation attacks. The user-centric security approaches handle issues such as user awareness and consent when the user is monitored and his or her data is shared, and feedback and control mechanisms to allow the end users to have a way to provide feedback on the usage or control of their own data. The authors have analyzed and categorized a vast number of publications on VSN security and privacy requirements, issues, and approaches using this holistic approach. This can be a useful resource for academics and students, as well as industry professionals to gain knowledge on the security requirements specific to each component of a VSN and its related security and privacy protection approaches. Online Computing Reviews Service

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 47, Issue 1
      July 2014
      551 pages
      ISSN:0360-0300
      EISSN:1557-7341
      DOI:10.1145/2620784
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 May 2014
      Accepted: 01 November 2013
      Revised: 01 July 2013
      Received: 01 January 2013
      Published in CSUR Volume 47, Issue 1

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Visual sensor networks
      2. image sensor security
      3. privacy protection

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)201
      • Downloads (Last 6 weeks)34
      Reflects downloads up to 13 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Improved Digital Security Applications for Smart CardInternational Journal of Research In Science & Engineering10.55529/ijrise.42.11.18(11-18)Online publication date: 1-Feb-2024
      • (2024)Privacy Preserving Data Analysis With Generative AIAI Techniques for Securing Medical and Business Practices10.4018/979-8-3693-8939-3.ch014(391-410)Online publication date: 13-Sep-2024
      • (2024)Beyond Current CryptographyInnovations in Modern Cryptography10.4018/979-8-3693-5330-1.ch001(1-30)Online publication date: 12-Jul-2024
      • (2024)A Proposal for A Human-in-the-Loop Daylight Control System—Preliminary Experimental ResultsEnergies10.3390/en1703054417:3(544)Online publication date: 23-Jan-2024
      • (2024)AI-Driven Privacy in Elderly Care: Developing a Comprehensive Solution for Camera-Based Monitoring of Older AdultsApplied Sciences10.3390/app1410415014:10(4150)Online publication date: 14-May-2024
      • (2024)The SA4P Framework: Sensing and Actuation as a PrivilegeProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657006(873-885)Online publication date: 1-Jul-2024
      • (2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
      • (2024)Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial PrivacyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338957219(5046-5059)Online publication date: 15-Apr-2024
      • (2024)PrivacyProber: Assessment and Detection of Soft–Biometric Privacy–Enhancing TechniquesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.331950021:4(2869-2887)Online publication date: 1-Jul-2024
      • (2024)Utility-Enhanced Image Obfuscation With Block Differential PrivacyIEEE Signal Processing Letters10.1109/LSP.2024.344571631(2135-2139)Online publication date: 2024
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media