Skip to main content

2019 | OriginalPaper | Buchkapitel

3. Connecting Physical-World to Cyber-World: Security and Privacy Issues in Pervasive Sensing

verfasst von : Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang

Erschienen in: Security and Privacy for Next-Generation Wireless Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to sufficiently connect the physical-world to the cyber-world, the advances of Internet of Things (IOT) have significantly enhanced the capability of capturing data from pervasive space. However, a number of new challenges have risen in regard to the security and privacy issues, due to the characteristics of pervasive sensing in IOT. On one hand, the security and privacy issues not only appear in the cyber space but also appear in the physical space with new forms and approaches, which bring potential risks to personal safety in the cyber-physical space; on the other hand, the characteristics of the pervasive sensing also offer new opportunities to tackle the security and privacy issues with brand-new thoughts and methods, by leveraging the out-of-band sensing and communication techniques. In this chapter, we will introduce the new challenges of security and privacy in pervasive sensing, and investigate the state-of-the-art schemes to address security and privacy issues in cyber-physical space, finally, we will summarize and discuss the new thoughts and methods to tackle security and privacy issues in pervasive sensing, and further address the directions of future research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ali, K., Liu, A.X., Wang, W., Shahzad, M.: Keystroke recognition using wifi signals. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom ’15, pp. 90–102 (2015) Ali, K., Liu, A.X., Wang, W., Shahzad, M.: Keystroke recognition using wifi signals. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom ’15, pp. 90–102 (2015)
2.
Zurück zum Zitat Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of WOOT (2010) Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of WOOT (2010)
3.
Zurück zum Zitat Bichler, D., Stromberg, G., Huemer, M.: Synchronizing shaking sequences for generating symmetric keys. In: Proc. of INDS (2009) Bichler, D., Stromberg, G., Huemer, M.: Synchronizing shaking sequences for generating symmetric keys. In: Proc. of INDS (2009)
4.
Zurück zum Zitat Bichler, D., Stromberg, G., Huemer, M., Low, M.: Key generation based on acceleration data of shaking processes. In: Proc. of UbiComp (2007) Bichler, D., Stromberg, G., Huemer, M., Low, M.: Key generation based on acceleration data of shaking processes. In: Proc. of UbiComp (2007)
5.
Zurück zum Zitat Bu, Y., Xie, L., Gong, Y., Yang, L., Liu, J., Lu, S.: Rf-dial: an rfid-based 2d human-computer interaction via tag array. In: INFOCOM 2018-IEEE Conference on Computer Communications, IEEE. IEEE (2018) Bu, Y., Xie, L., Gong, Y., Yang, L., Liu, J., Lu, S.: Rf-dial: an rfid-based 2d human-computer interaction via tag array. In: INFOCOM 2018-IEEE Conference on Computer Communications, IEEE. IEEE (2018)
6.
Zurück zum Zitat Castelluccia, C., Mutaf, P.: Shake them up! a movement- based pairing protocol for cpu-constrained devices. In: Proc. of ACM MobiSys (2005) Castelluccia, C., Mutaf, P.: Shake them up! a movement- based pairing protocol for cpu-constrained devices. In: Proc. of ACM MobiSys (2005)
7.
Zurück zum Zitat Chen, S., Pande, A., Mohapatra, P.: Sensor-assisted facial recognition: An enhanced biometric authentication system for smartphones. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys ’14, pp. 109–122 (2014) Chen, S., Pande, A., Mohapatra, P.: Sensor-assisted facial recognition: An enhanced biometric authentication system for smartphones. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys ’14, pp. 109–122 (2014)
8.
Zurück zum Zitat Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)MathSciNetCrossRef Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)MathSciNetCrossRef
9.
Zurück zum Zitat Lester, J., Hannaford, B., Borriello, G.: Are you with me? - using accelerometers to determine if two devices are carried by the same person. In: Proc. of PERVASIVE 2004 (2004) Lester, J., Hannaford, B., Borriello, G.: Are you with me? - using accelerometers to determine if two devices are carried by the same person. In: Proc. of PERVASIVE 2004 (2004)
10.
Zurück zum Zitat Liu, H., Wang, Y., Yang, J., Chen, Y.: Fast and practical secret key extraction by exploiting channel response. In: Proc. of IEEE INFOCOM (2013) Liu, H., Wang, Y., Yang, J., Chen, Y.: Fast and practical secret key extraction by exploiting channel response. In: Proc. of IEEE INFOCOM (2013)
11.
Zurück zum Zitat Liu, H., Yang, J., Wang, Y., Chen, Y.: Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In: Proc. of IEEE INFOCOM (2012) Liu, H., Yang, J., Wang, Y., Chen, Y.: Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In: Proc. of IEEE INFOCOM (2012)
12.
Zurück zum Zitat Liu, J., Wang, Y., Kar, G., Chen, Y., Yang, J., Gruteser, M.: Snooping keystrokes with mm-level audio ranging on a single phone. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom ’15, pp. 142–154 (2015) Liu, J., Wang, Y., Kar, G., Chen, Y., Yang, J., Gruteser, M.: Snooping keystrokes with mm-level audio ranging on a single phone. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom ’15, pp. 142–154 (2015)
13.
Zurück zum Zitat Mayrhofer, R.: The candidate key protocol for generating secret shared keys from similar sensor data streams. In: Proc. of ESAS 2007 (2007) Mayrhofer, R.: The candidate key protocol for generating secret shared keys from similar sensor data streams. In: Proc. of ESAS 2007 (2007)
14.
Zurück zum Zitat Mayrhofer, R., Gellersen, H.: Shake well before use: Authentication based on accelerometer data. In: Proc. of PERVASIVE 2007 (2007) Mayrhofer, R., Gellersen, H.: Shake well before use: Authentication based on accelerometer data. In: Proc. of PERVASIVE 2007 (2007)
15.
Zurück zum Zitat Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and secure pairing of mobile devices. In: Proc. of IEEE Mobile Computing (2009) Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and secure pairing of mobile devices. In: Proc. of IEEE Mobile Computing (2009)
16.
Zurück zum Zitat N. H. Zakaria D. Griffiths, S.B., Yan, J.: Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of SOUPS (2011) N. H. Zakaria D. Griffiths, S.B., Yan, J.: Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of SOUPS (2011)
17.
Zurück zum Zitat Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: Proc. of INFOCOM (2014) Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: Proc. of INFOCOM (2014)
18.
Zurück zum Zitat Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Enhancing privacy through caching in location-based services. In: Proc. of INFOCOM (2015) Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Enhancing privacy through caching in location-based services. In: Proc. of INFOCOM (2015)
19.
Zurück zum Zitat Qiao, Y., Zhang, O.., Zhou, W., Srinivasan K.and Andarora, A.: Phycloak: Obfuscating sensing from communication signals. In: Proc. of NSDI (2016) Qiao, Y., Zhang, O.., Zhou, W., Srinivasan K.and Andarora, A.: Phycloak: Obfuscating sensing from communication signals. In: Proc. of NSDI (2016)
20.
Zurück zum Zitat Sethi, M., Antikainen, M., Aura, T.: Commitment-based device pairing with synchronized drawing. In: Proc. of IEEE PerCom (2014) Sethi, M., Antikainen, M., Aura, T.: Commitment-based device pairing with synchronized drawing. In: Proc. of IEEE PerCom (2014)
21.
Zurück zum Zitat Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures you can see it but you can not do it. In: Proceedings of ACM MOBICOM (2013) Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures you can see it but you can not do it. In: Proceedings of ACM MOBICOM (2013)
22.
Zurück zum Zitat Sherman, M., Clark, G., Yang, Y., Sugrim, S., Modig, A., Lindqvist, J., Oulasvirta, A., Roos, T.: User-generated free-form gestures for authentication: Security and memorability. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys ’14, pp. 176–189 (2014) Sherman, M., Clark, G., Yang, Y., Sugrim, S., Modig, A., Lindqvist, J., Oulasvirta, A., Roos, T.: User-generated free-form gestures for authentication: Security and memorability. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys ’14, pp. 176–189 (2014)
23.
Zurück zum Zitat Song, C., Wang, A., Ren, K., Xu, W.: Eyeveri: A secure and usable approach for smartphone user authentication. In: Proceedings of IEEE INFOCOM (2016) Song, C., Wang, A., Ren, K., Xu, W.: Eyeveri: A secure and usable approach for smartphone user authentication. In: Proceedings of IEEE INFOCOM (2016)
24.
Zurück zum Zitat Sprager, S., Zazula, D.: A cumulant-based method for gait identification using accelerometer data with principal component analysis and support vector machine. WSEAS Trans. Signal Processing 5(11), 369–378 (2009) Sprager, S., Zazula, D.: A cumulant-based method for gait identification using accelerometer data with principal component analysis and support vector machine. WSEAS Trans. Signal Processing 5(11), 369–378 (2009)
25.
Zurück zum Zitat Vera-Rodriguez, R., Mason, J.S., Fierrez, J., Ortega-Garcia, J.: Comparative analysis and fusion of spatiotemporal information for footstep recognition. IEEE Trans. Pattern Analysis and Machine Intelligence 34(4), 823–834 (2013)CrossRef Vera-Rodriguez, R., Mason, J.S., Fierrez, J., Ortega-Garcia, J.: Comparative analysis and fusion of spatiotemporal information for footstep recognition. IEEE Trans. Pattern Analysis and Machine Intelligence 34(4), 823–834 (2013)CrossRef
26.
Zurück zum Zitat Wang, C., Xie, L., Wang, W., Chen, Y., Bu, Y., Lu, S.: Rf-ecg: Heart rate variability assessment based on cots rfid tag array. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2(6), 85 (2018)CrossRef Wang, C., Xie, L., Wang, W., Chen, Y., Bu, Y., Lu, S.: Rf-ecg: Heart rate variability assessment based on cots rfid tag array. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2(6), 85 (2018)CrossRef
27.
Zurück zum Zitat Wang, C., Zhang, J., Wang, L., Pu, J., Yuan, X.: Human identification using temporal information preserving gait template. IEEE Trans. Pattern Analysis and Machine Intelligence 34(11), 2164–2176 (2012)CrossRef Wang, C., Zhang, J., Wang, L., Pu, J., Yuan, X.: Human identification using temporal information preserving gait template. IEEE Trans. Pattern Analysis and Machine Intelligence 34(11), 2164–2176 (2012)CrossRef
28.
Zurück zum Zitat Wang, W., Liu, A.X., Shahzad, M.: Gait recognition using wifi signals. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp ’16, pp. 363–373 (2016) Wang, W., Liu, A.X., Shahzad, M.: Gait recognition using wifi signals. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp ’16, pp. 363–373 (2016)
29.
Zurück zum Zitat Wei, T., Wang, S., Zhou, A., Zhang, X.: Acoustic eavesdropping through wireless vibrometry. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom ’15, pp. 130–141 (2015) Wei, T., Wang, S., Zhou, A., Zhang, X.: Acoustic eavesdropping through wireless vibrometry. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom ’15, pp. 130–141 (2015)
30.
Zurück zum Zitat Yin, Y., Xie, L., Fan, Y., Lu, S.: Tracking human motions in photographing: A context-aware energy-saving scheme for smart phones. ACM Transactions on Sensor Networks (TOSN) 13(4), 29 (2017)CrossRef Yin, Y., Xie, L., Fan, Y., Lu, S.: Tracking human motions in photographing: A context-aware energy-saving scheme for smart phones. ACM Transactions on Sensor Networks (TOSN) 13(4), 29 (2017)CrossRef
31.
Zurück zum Zitat Zhu, X., Xu, F., Novak, E., Tan, C.C., Li, Q., Chen, G.: Extracting secret key from wireless link dynamics in vehicular environments. In: Proc. of IEEE INFOCOM (2009) Zhu, X., Xu, F., Novak, E., Tan, C.C., Li, Q., Chen, G.: Extracting secret key from wireless link dynamics in vehicular environments. In: Proc. of IEEE INFOCOM (2009)
32.
Zurück zum Zitat Zhu, Z., Cao, G.: Applaus: A privacy-preserving location proof updating system for location-based services. In: Proc. of INFOCOM (2011) Zhu, Z., Cao, G.: Applaus: A privacy-preserving location proof updating system for location-based services. In: Proc. of INFOCOM (2011)
Metadaten
Titel
Connecting Physical-World to Cyber-World: Security and Privacy Issues in Pervasive Sensing
verfasst von
Sheng Zhong
Hong Zhong
Xinyi Huang
Panlong Yang
Jin Shi
Lei Xie
Kun Wang
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-01150-5_3

Premium Partner