Loading [MathJax]/extensions/MathMenu.js
On privacy and security in distributed visual sensor networks | IEEE Conference Publication | IEEE Xplore

On privacy and security in distributed visual sensor networks


Abstract:

There is a critical need to provide privacy assurances for distributed vision-based sensor networking in applications such as building surveillance and healthcare monitor...Show More

Abstract:

There is a critical need to provide privacy assurances for distributed vision-based sensor networking in applications such as building surveillance and healthcare monitoring. To effectively address protection and reliability issues, secure networking and processing must be considered from system inception. This paper presents attacks that affect the data privacy in visual sensor networks and proposes privacy-promoting security solutions based on opponent detection via game-theoretic analysis and keyless encryption.
Date of Conference: 12-15 October 2008
Date Added to IEEE Xplore: 12 December 2008
ISBN Information:

ISSN Information:

Conference Location: San Diego, CA, USA
References is not available for this document.

1. INTRODUCTION

In this work, we consider privacy and security mechanisms for a heterogeneous wireless visual sensor network (VSN). The network is comprised of wirelessly communicating camera nodes and scalar sensors where the sensors trigger the cameras and provide specific privacy guarantees based on event detection. The network may be deployed in one or more zones such as throughout a building and its perimeters. The scalar sensor network may contain a number of malicious nodes that have been remotely or locally re-programmed to disinform regarding the presence of an event for the purpose of enabling and disabling camera privacy settings. Upon acquisition of the privacy enabled or disabled frames, camera nodes must encrypt and wirelessly transmit them to a local or off-site sink even if secret keys have been compromised. The surveillance network must thus remain dependable and provide privacy as well as confidentiality of surveillance despite disruption and disinformation activities.

Select All
1.
B. P. L. Lo, J. L. Wang, and G.-Z. Yang, "From imaging networks to behavior profiling: Ubiquitous sensing for managed homecare of the elderly," in Adjunct Proc. International Conference on Pervasive Computing, Munich, Germany, May 2005, pp. 101-104.
2.
D. A. Fidaleo, H.-A. Nguyen, and M. Trivedi, "The networked sensor tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks," in Proc. ACM International Workshop on Video Surveillance and Sensor Networks, New York, NY, October 2004, pp. 46-53.
3.
J. Wickramasuriya, M. Datt, S. Mehrotra, and N. Venkatasubra-manian, "Privacy protecting data collection in media spaces," in Proc. ACM International Conference on Multimedia, New York, NY, October 2004, pp. 48-55.
4.
A. Czarlinska and D. Kundur, "Attack vs. failure detection in event-driven wireless visual sensor networks," in ACM Multimedia & Security Workshop (MM&Sec'07), Dallas, TX, 20-21 September 2007.
5.
A. Czarlinska and D. Kundur, "Reliable Event-Detection in Wireless Visual Sensor Networks through Scalar Collaboration and Game Theoretic Consideration," IEEE Transactions on Multimedia, Special Issue on Multimedia Applications in Mobile/Wireless Contexts, accepted., Available: www.ece.tamu.edu/~czlinska/TMM08/WVSN.pdf.
6.
M. Wu and C. W. Chen, "Collaborative image coding and transmission over wireless sensor networks," EURASIP Journal on Advances in Signal Processing, no. 70481, 2007.
7.
W. Luh and D. Kundur, "Secure distributed source coding with side-information," IEEE Communications Letters, 2008, Accepted.
8.
D. Devarajan, R. J. Radke, and H. Chung, "Distributed metric calibration of ad hoc camera networks," ACM Trans. on Sensor Networks, vol. 2, no. 3, pp. 380-403, August 2006.
9.
A. Barton-Sweeney, D. Lymberopoulos, and A. Savvides, "Sensor localization and camera calibration in distributed camera sensor networks," in Proc. of IEEE BaseNets, San Jose, CA, October 2006.

Contact IEEE to Subscribe

References

References is not available for this document.