Park Homin, Basaran Can, Park Taejoon, Son Sang Hyuk
Department of Information and Communication Engineering, Daegu Gyeongbuk Institute of Science and Technology (DGIST), 333 Techno Jungang-Daero, Hyeonpung-Myeon, Dalseong-Gun, Daegu 711-873, Korea.
Northern Cyprus Campus, Middle East Technical University, Mersin 10, Turkey.
Sensors (Basel). 2014 Sep 2;14(9):16235-57. doi: 10.3390/s140916235.
Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks.
对充斥着普适计算设备的智能环境的研究正在迅速推进,同时也引发了严重的隐私问题。根据最近的研究,隐私担忧严重阻碍了智能家居技术的广泛应用。先前的工作表明,通过监测无线电指纹和流量模式,可以推断配备无线传感器的环境中的日常生活活动。由于数据加密无法防止利用传输模式分析和统计推断的隐私侵犯,因此已经研究了各种基于生成虚假数据来隐藏流量模式的方法。在本文中,我们描述了一种节能、轻量级、低延迟的算法,用于创建与观察到的现象在语义上相似的虚拟活动。通过使用这些伪装活动,可以灵活控制虚假数据传输的数量,以支持在能源效率和隐私保护之间进行权衡。根据使用从智能家居环境收集的真实数据进行的实验,与文献中的先前方法相比,我们提出的方法可以将网络寿命延长2倍以上。此外,活动伪装方法支持真实数据的低延迟传输,同时还显著降低了无线窥探攻击的准确性。