skip to main content
research-article

Security and Privacy Protection in Visual Sensor Networks: A Survey

Authors Info & Claims
Published:01 May 2014Publication History
Skip Abstract Section

Abstract

Visual sensor networks (VSNs) are receiving a lot of attention in research, and at the same time, commercial applications are starting to emerge. VSN devices come with image sensors, adequate processing power, and memory. They use wireless communication interfaces to collaborate and jointly solve tasks such as tracking persons within the network. VSNs are expected to replace not only many traditional, closed-circuit surveillance systems but also to enable emerging applications in scenarios such as elderly care, home monitoring, or entertainment. In all of these applications, VSNs monitor a potentially large group of people and record sensitive image data that might contain identities of persons, their behavior, interaction patterns, or personal preferences. These intimate details can be easily abused, for example, to derive personal profiles.

The highly sensitive nature of images makes security and privacy in VSNs even more important than in most other sensor and data networks. However, the direct use of security techniques developed for related domains might be misleading due to the different requirements and design challenges. This is especially true for aspects such as data confidentiality and privacy protection against insiders, generating awareness among monitored people, and giving trustworthy feedback about recorded personal data—all of these aspects go beyond what is typically required in other applications.

In this survey, we present an overview of the characteristics of VSN applications, the involved security threats and attack scenarios, and the major security challenges. A central contribution of this survey is our classification of VSN security aspects into data-centric, node-centric, network-centric, and user-centric security. We identify and discuss the individual security requirements and present a profound overview of related work for each class. We then discuss privacy protection techniques and identify recent trends in VSN security and privacy. A discussion of open research issues concludes this survey.

References

  1. Najwa Aaraj, Anand Raghunathan, and Niraj K. Jha. 2008. Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Transactions on Embedded Computing Systems 8, 1, 1--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Hamid Aghajan, Juan Carlos Augusto, Chen Wu, Paul Mccullagh, and Julie-Ann Walkden. 2007. Distributed vision-based accident management for assisted living. In Proceedings of the International Conference on Smart Homes and Health Telematics. 196--205. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Kwabene W. Agyeman and Anthony Rowe. 2012. CMUcam4 Feature List. Technical Report.Google ScholarGoogle Scholar
  4. Ian F. Akyildiz, Tommaso Melodia, and Kaushik R. Chowdhury. 2007. A survey on wireless multimedia sensor networks. Computer Networks 51, 4, 921--960. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. G. Albanesi, M. Ferretti, and F. Guerrini. 2001. A taxonomy for image authentication techniques and its application to the current state of the art. In Proceedings of the International Conference on Image Analysis and Processing. 535--540. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Hani Alzaid, Ernest Foo, and Juan Gonzales Nieto. 2007. Secure data aggregation in wireless sensor network: A survey. In Proceedings of the Australasian Information Security Conference. 13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. ARM Limited. 2009. ARM Security Technology: Building a Secure System Using TrustZone Technology. Technical Report.Google ScholarGoogle Scholar
  8. Clemens Arth, Horst Bischof, and Christian Leistner. 2006. TRICam: An embedded platform for remote traffci surveillance. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop. 125--133. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Pradeep K. Atrey, Wei-Qi Yan, Ee-Chien Chang, and Mohan S. Kankanhalli. 2004. A hierarchical signature scheme for robust video authentication using secret sharing. In Proceedings of the International Conference on Multimedia Modelling. 330--337. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pradeep K. Atrey, Wei-Qi Yan, and Mohan S. Kankanhalli. 2006. A scalable signature scheme for video authentication. Multimedia Tools and Applications 34, 1, 107--135. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jerome Azema and Gilles Fayad. 2008. M-Shield Mobile Security Technology: Making Wireless Secure. Technical Report. Texas Instruments.Google ScholarGoogle Scholar
  12. Nadia Baaziz, Nathalie Lolo, Oscar Padilla, and Felix Petngang. 2007. Security and privacy protection for automated video surveillance. In Proceedings of the International Symposium on Signal Processing and Information Technology. 17--22.Google ScholarGoogle ScholarCross RefCross Ref
  13. Athanasios Bamis, Dimitrios Lymberopoulos, Thiago Teixeira, and Andreas Savvides. 2010. The BehaviorScope framework for enabling ambient assisted living. Personal and Ubiquitous Computing 14, 6 (March 2010), 473--487. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Franco Bartolini, Anastasios Tefas, Mauro Barni, and Ioannis Pitas. 2001. Image authentication techniques for surveillance applications. Proceedings of the IEEE 89, 10, 1403--1418.Google ScholarGoogle ScholarCross RefCross Ref
  15. Horst Bischof, Martin Godec, Christian Leistner, Bernhard Rinner, and Andreas Starzacher. 2010. Autonomous audio-supported learning of visual classifiers for traffic monitoring. IEEE Intelligent Systems 25, 3, 15--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Azzedine Boukerche and Damla Turgut. 2007. Secure time synchronization protocols for wireless sensor networks. IEEE Wireless Communications 14, 5, 64--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Terrance Edward Boult. 2005. PICO: Privacy through invertible cryptographic obscuration. In Proceedings of the Workshop on Computer Vision for Interactive and Intelligent Environments. 27--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Michael Boyle, Christopher Edwards, and Saul Greenberg. 2000. The effects of filtered video on awareness and privacy. In Proceedings of the Conference on Computer Supported Cooperative Work. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Michael Bramberger, Josef Brunner, Bernhard Rinner, and Helmut Schwabach. 2004. Real-time video analysis on an embedded smart camera for traffic surveillance. In IEEE Real-Time and Embedded Technology and Applications Symposium. 174--181. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jack Brassil. 2005. Using mobile communications to assert privacy from video surveillance. In Proceedings of the Parallel and Distributed Processing Symposium. 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. William M. Bulkeley. 2009. Chicago's Camera Network Is Everywhere. Retrieved March 2012 from http://online.wsj.com/article/SB100014240527487045384045745399104128247 56.html.Google ScholarGoogle Scholar
  22. Claude Castelluccia, Aldar C-F. Chan, Einar Mykletun, and Gene Tsudik. 2009. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks 5, 3 (May 2009), 1--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Andrea Cavallaro. 2004. Adding privacy constraints to video-based applications. In Proceedings of the European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology. 8.Google ScholarGoogle Scholar
  24. Andrea Cavallaro. 2007. Privacy in video surveillance. IEEE Signal Processing Magazine 24, 2 (March 2007), 168--169.Google ScholarGoogle ScholarCross RefCross Ref
  25. Ann Cavoukian. 2013a. Privacy by Design Centre of Excellence. Ph.D. Dissertation. Information & Privacy Commissioner Ontario, Canada.Google ScholarGoogle Scholar
  26. Ann Cavoukian. 2013b. Surveillance, Then and Now: Securing Privacy in Public Spaces. Technical Report.Google ScholarGoogle Scholar
  27. Haowen Chan and Adrian Perrig. 2003. Security and privacy in sensor networks. IEEE Computer 36, 10, 103--105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Haowen Chan, Adrian Perrig, and Dawn Song. 2006. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of the International Conference on Computer and Communications Security. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Ankur Chattopadhyay and Terrance Edward Boult. 2007. PrivacyCam: A privacy preserving camera using uCLinux on the Blackfin DSP. In Proceedings of the International Conference on Computer Vision and Pattern Recognition. 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  30. Datong Chen, Yi Chang, Rong Yan, and Jie Yang. 2007. Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Applied Signal Processing 2007, 1, 107--116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Mo Chen, Jessica Fridrich, Miroslav Goljan, and Jan Lukás. 2008. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 3, 1, 74--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Phoebus Wei-Chih Chen, Parvez Ahammad, Colby Boyer, Shih-I Huang, Leon Lin, Edgar J. Lobaton, Marci Lenore Meingast, Songhwai Oh, Simon Wang, Posu Yan, Allen Yang, Chuohao Yeo, Lung-Chung Chang, Doug Tygar, and S. Shankar Sastry. 2008. CITRIC: A low-bandwidth wireless camera network platform. In Proceedings of the International Conference on Distributed Smart Cameras. 10.Google ScholarGoogle Scholar
  33. Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou. 2009. Sensor network security: A survey. IEEE Communications Surveys and Tutorials 11, 2, 52--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Sen-Ching Samson Cheung, Jithendra K. Paruchuri, and Thinh P. Nguyen. 2008. Managing privacy data in pervasive camera networks. In Proceedings of the International Conference on Image Processing. 1676--1679.Google ScholarGoogle Scholar
  35. Sen-Ching Samson Cheung, Jian Zhao, and M Vijay Venkatesh. 2006. Efficient object-based video inpainting. In Proceedings of the International Conference on Image Processing. 705--708.Google ScholarGoogle Scholar
  36. Kenta Chinomi, Naoko Nitta, Yoshimichi Ito, and Noboru Babaguchi. 2008. PriSurv: Privacy protected video surveillance system using adaptive visual abstraction. In Proceedings of the International Multimedia Modeling Conference. 144--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Rita Cucchiara, Massimo Piccardi, and Paola Mello. 2000. Image analysis and rule-based reasoning for a traffic monitoring system. IEEE Transactions on Intelligent Transportation Systems 1, 2 (June 2000), 119--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Jing Deng, R. Han, and Shivakant Mishra. 2006. INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications 29, 2 (January 2006), 216--230. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Tim Dierks and Christopher Allen. 1999. RFC 2246: The TLS Protocol. Retrieved April 2014 from http://www.ietf.org/rfc/rfc2246.txt.Google ScholarGoogle Scholar
  40. Kurt Dietrich and Johannes Winter. 2009. Implementation aspects of mobile and embedded trusted computing. In Proceedings of the International Conference on Trust and Trustworthy Computing. 29--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Kurt Dietrich and Johannes Winter. 2010. Towards customizable, application specific mobile trusted modules. In Proceedings of the Workshop on Scalable Trusted Computing. 31--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Akshay Dua, Nirupama Bulusu, Wu-Chang Feng, and Wen Hu. 2009. Towards trustworthy participatory sensing. In Proceedings of the USENIX Workshop on Hot Topics in Security. 6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Frédéric Dufaux and Touradj Ebrahimi. 2006. Scrambling for video surveillance with privacy. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop. 160--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Frédéric Dufaux and Touradj Ebrahimi. 2010. A framework for the validation of privacy protection solutions in video surveillance. In Proceedings of the International Conference on Multimedia and Expo. 66--71.Google ScholarGoogle ScholarCross RefCross Ref
  45. Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, and Marko Wolf. 2007. Reconfigurable trusted computing in hardware. In Proceedings of the Workshop on Scalable Trusted Computing. 15--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Jan-Erik Ekberg and Markus Kylänpää. 2007. Mobile Trusted Module (MTM)—An Introduction. Technical Report NRC-TR-2007-015. Nokia Research Center.Google ScholarGoogle Scholar
  47. Jeremy Elson and Kay Römer. 2002. Wireless sensor networks: A new regime for time synchronization. In Proceedings of the Workshop on Hot Topics in Networks. 6.Google ScholarGoogle Scholar
  48. Ádám Erdélyi, Thomas Winkler, and Bernhard Rinner. 2013. Serious fun: Cartooning for privacy protection. In Proceedings of the MediaEval Workshop. 2.Google ScholarGoogle Scholar
  49. Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, and Tomas Toft. 2009. Privacy-preserving face recognition. In Proceedings of the International Symposium on Privacy Enhancing Technologies. 235--253. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Zekeriya Erkin, Alessandro Piva, Stefan Katzenbeisser, R. L. Lagendijk, Jamshid Shokrollahi, Gregory Neven, and Mauro Barni. 2007. Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security 2007, 20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Dan Farmer and Charles C. Mann. 2003. Surveillance nation (part I). Technology Review 4, 34--43.Google ScholarGoogle Scholar
  52. Douglas A. Fidaleo, Hoang-Anh Nguyen, and Mohan Trivedi. 2004. The Networked Sensor Tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In Proceedings of the International Workshop on Video Surveillance and Sensor Networks. 46--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Sven Fleck and Wolfgang Straßer. 2008. Smart camera based monitoring system and its application to assisted living. Proceedings of the IEEE 96, 10, 1698--1714.Google ScholarGoogle ScholarCross RefCross Ref
  54. Sven Fleck and Wolfgang Straßer. 2010. Towards secure and privacy sensitive surveillance. In Proceedings of the International Conference on Distributed Smart Cameras. 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Gary L. Friedman. 1993. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics 39, 4, 905--910. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Saurabh Ganeriwal, Ram Kumar, and Mani B. Srivastava. 2003. Time-sync protocols for sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems. 12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Saurabh Ganeriwal, Christina Pöepper, Srdjan Capkun, and Mani B. Srivastava. 2008. Secure time synchronization in sensor networks. ACM Transactions on Sensor Networks 11, 4, 1--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, and Jürgen Becker. 2008a. A system architecture for reconfigurable trusted platforms. In Proceedings of the Conference on Design, Automation and Test in Europe. 541--544. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Benjamin Glas, Alexander Klimm, David Schwab, Klaus D. Müller-Glaser, and Jürgen Becker. 2008b. A prototype of trusted platform functionality on reconfigurable hardware for bitstream updates. In Proceedings of the International Symposium on Rapid System Prototyping. 135--141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Ralph Gross, Latanya Sweeney, Fernando De Torre, and Simon Baker. 2006. Model-based face de-identification. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop. 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Ulrich Grossmann, Enrik Berkhan, Luciana C. Jatoba, Joerg Ottenbacher, Wilhelm Stork, and Klaus D. Müller-Glaser. 2007. Security for mobile low power nodes in a personal area network by means of trusted platform modules. In Proceedings of the Workshop on Security and Privacy in Ad Hoc and Sensor Networks. 172--186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Arun Hampapur. 2008. Smart video surveillance for proactive security. IEEE Signal Processing Magazine 25, 4 (July 2008), 134--136.Google ScholarGoogle ScholarCross RefCross Ref
  63. Arun Hampapur, S. Borger, Lisa Brown, C. Carlson, Jonathan Connell, Max Lu, Andrew Senior, V. Reddy, Chiao Fe Shu, and Ying-Li Tian. 2007. S3: The IBM smart surveillance system: From transactional systems to observational systems. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing. 1385--1388.Google ScholarGoogle ScholarCross RefCross Ref
  64. HART Communication Foundation. 2010. WirelessHART Security Overview. Retrieved October 2013 from http://www.hartcomm.org/.Google ScholarGoogle Scholar
  65. Dajun He, Qibin Sun, and Qi Tian. 2004. A secure and robust object-based video authentication system. EURASIP Journal on Advances in Signal Processing 2004, 14, 2185--2200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Frank Helten and Bernd Fischer. 2004. What Do People Think about CCTV? Findings from a Berlin Survey. Technical Report. Berlin Institute for Social Research.Google ScholarGoogle Scholar
  67. Martin Hoffmann, Michael Wittke, Yvonne Bernard, Ramin Soleymani, and Jörg Hähner. 2008. DMCTRAC: Distributed multi camera tracking. In Proceedings of the International Conference on Distributed Smart Cameras. 10.Google ScholarGoogle ScholarCross RefCross Ref
  68. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei. 2011. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. In Proceedings of SPIE. 12.Google ScholarGoogle Scholar
  69. Wen Hu, Peter Corke, Wen Chan Shih, and Leslie Overs. 2009. secFleck: A public key technology platform for wireless sensor networks. In Proceedings of the European Conference on Wireless Sensor Networks. 296--311. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Wen Hu, Hailun Tan, Peter Corke, Wen Chan Shih, and Sanjay Jha. 2010. Toward trusted wireless sensor networks. ACM Transactions on Sensor Networks 7, 1 (August 2010), 25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. 2005. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11, 1--2 (January 2005), 21--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. ISA100 Wireless Compliance Institute. 2011. ISA-100.11.a Wireless Standard. Retrieved October 2013 from http://www.isa100wci.org/.Google ScholarGoogle Scholar
  73. Peyman Kabiri and Ali A. Ghorbani. 2005. Research on intrusion detection and response: A survey. International Journal of Network Security 1, 2, 84--102.Google ScholarGoogle Scholar
  74. Chris Karlof, Neveen Sastry, and David Wagner. 2004. TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems. 162--175. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1, 2--3, 293--315.Google ScholarGoogle ScholarCross RefCross Ref
  76. Vladimir Katalov. 2011. Nikon Image Authentication System: Compromised. Retrieved March 2012 from http://www.elcomsoft.com/nikon.html.Google ScholarGoogle Scholar
  77. Pavel Korshunov, C. Araimo, Francesca Desimone Simone, C. Velardo, J.-L. Dugelay, and Touradj Ebrahimi. 2012a. Subjective study of privacy filters in video surveillance. In Proceedings of the International Workshop on Multimedia Signal Processing. 5.Google ScholarGoogle ScholarCross RefCross Ref
  78. Pavel Korshunov, Shuting Cai, and Touradj Ebrahimi. 2012b. Crowdsourcing approach for evaluation of privacy filters in video surveillance. In Proceedings of the International Workshop on Crowdsourcing for Multimedia. 6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Pavel Korshunov and Touradj Ebrahimi. 2013. Using warping for privacy protection in video surveillance. In Proceedings of the International Conference on Digital Signal Processing. 6.Google ScholarGoogle ScholarCross RefCross Ref
  80. Kari Kostiainen, N. Asokan, and Jan-Erik Ekberg. 2011. Practical property-based attestation on mobile devices. In Proceedings of the International Conference on Trust and Trustworthy Computing. 78--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Stefan Krempl and Andreas Wilkens. 2011. Datenschützer beanstanden Videoüberwachung in ECE-Einkaufszentren.Retrieved March 2013 from http://heise.de/-1187205.Google ScholarGoogle Scholar
  82. Reginald L. Lagendijk, Zekeriya Erkin, and Mauro Barni. 2013. Encrypted signal processing for privacy protection. IEEE Signal Processing Magazine 30, 1, 82--105.Google ScholarGoogle ScholarCross RefCross Ref
  83. Chang-tsun Li. 2010. Source camera identification using enhanced sensor pattern noise. IEEE Transactions on Information Forensics and Security 5, 2 (June 2010), 280--287. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Guangzhen Li, Yoshimichi Ito, Xiaoyi Yu, Naoko Nitta, and Noboru Babaguchi. 2009. Recoverable privacy protection for video content distribution. EURASIP Journal on Information Security 2009, 11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Ying Luo, Shuiming Ye, and Sen-Ching Samson Cheung. 2010. Anonymous subject identification in privacy-aware video surveillance. In Proceedings of the International Conference on Multimedia and Expo. 83--88.Google ScholarGoogle ScholarCross RefCross Ref
  86. Michael Manzo, Tanya Roosta, and Shankar Sastry. 2005. Time synchronization attacks in sensor networks. In Proceedings of the Workshop on Security of Ad Hoc and Sensor Networks. 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Andrew Martin. 2008. The Ten Page Introduction to Trusted Computing. Technical Report RR-08-11. Oxford University Computing Laboratory.Google ScholarGoogle Scholar
  88. Isabel Martínez-Ponte, Xavier Desurmont, Jerome Meessen, and Jean-François Delaigle. 2005. Robust human face hiding ensuring privacy. In Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services. 4.Google ScholarGoogle Scholar
  89. Nasir Memon and Ping Wah Wong. 1998. Protecting digital media content. Communications of the ACM 41, 7 (July 1998), 35--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. Christian Micheloni, Gian Luca Foresti, and Lauro Snidaro. 2005. A network of co-operative cameras for visual surveillance. IEEE Proceedings on Vision, Image and Signal Processing 152, 2, 205--212.Google ScholarGoogle ScholarCross RefCross Ref
  91. Saraju P. Mohanty. 2009. A secure digital camera architecture for integrated real-time digital rights management. Journal of Systems Architecture 55, 10--12 (October 2009), 468--480. Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Simon Moncrieff, Svetha Venkatesh, and Geoff West. 2009. Dynamic privacy in public surveillance. IEEE Computer 42, 9 (September 2009), 22--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, and Grammati Pantziou. 2009. A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys and Tutorials 11, 4, 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Steven Ney and Kurt Pichler. 2002. Video Surveillance in Austria. Technical Report. Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria.Google ScholarGoogle Scholar
  95. Clive Norris. 2009. A Review of the Increased Use of CCTV and Video-Surveillance for Crime Prevention Purposes in Europe. Technical Report. Department of Sociological Studies, University of Sheffield, United Kingdom.Google ScholarGoogle Scholar
  96. Vladimir A. Oleshchuk. 2007. Privacy preserving monitoring and surveillance in sensor networks. In Proceedings of the Frontiers of High Performance Computing and Networking Workshops. Lecture Notes in Computer Science, Vol. 4743. 485--492. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. OpenStreetMap.org. 2011. OpenStreetMap.org Video Surveillance Camera Overlay. Retrieved April 2011 from http://osm.vdska.de/.Google ScholarGoogle Scholar
  98. Sddka Berna Örs, Gürkaynak Frank, Elisabeth Oswald, and Bart Preneel. 2004. Power-analysis attack on an ASIC AES implementation. In Proceedings of the International Conference on Information Technology: Coding and Computing. 2--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. OWNI. 2011. CCTV Camera Positions in Paris. Retrieved March 2012 from http://app.owni.fr/camera-paris/.Google ScholarGoogle Scholar
  100. Suat Ozdemir and Yang Xiao. 2009. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks 53, 12 (August 2009), 2022--2037. Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. Adrian Perrig, Ran Canetti, J. D. Tygar, and Dawn Song. 2002. The TESLA broadcast authentication protocol. RSA Cryptobytes 5.Google ScholarGoogle Scholar
  102. Adrian Perrig, John A. Stankovic, and David Wagner. 2004. Security in wireless sensor networks. Communications of the ACM 47, 6, 53--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler. 2002. SPINS: Security protocols for sensor networks. Wireless Networks 8, 5, 521--534. Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Alvaro Pinto. 2011. Wireless Embedded Smart Cameras: Performance Analysis and Their Application to Fall Detection for Eldercare. Ph.D. Dissertation.Google ScholarGoogle Scholar
  105. Thomas Popp, Stefan Mangard, and Elisabeth Oswald. 2007. Power analysis attacks and countermeasures. IEEE Design and Test of Computers 24, 6, 535--543. Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Christina Pöpper, Mario Strasser, and Srdjan Capkun. 2010. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications 28, 5, 1--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Prefecture de Police. 2010. Plan de Vidéoprotection pour Paris. Technical Report.Google ScholarGoogle Scholar
  108. Markus Quaritsch, Markus Kreuzthaler, Bernhard Rinner, Horst Bischof, and Bernhard Strobl. 2007. Autonomous multicamera tracking on embedded smart cameras. EURASIP Journal on Embedded Systems 2007, 1, 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Jean-Jacques Quisquater, Benoit Macq, Marc Joye, N. Degand, and A. Bernard. 1997. Practical solution to authentication of images with a secure camera. Storage and Retrieval for Image and Video Databases 3022, 1, 290--297.Google ScholarGoogle ScholarCross RefCross Ref
  110. Faisal Z. Qureshi. 2009. Object-video streams for preserving privacy in video surveillance. In Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance. 442--447. Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Mohammad Rahimi, Rick Baer, Obimdinachi I. Iroezi, Juan C. Garcia, Jay Warrior, Deborah Estrin, and Mani B. Srivastava. 2005. Cyclops: In situ image sensing and interpretation in wireless sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems. 13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Mizanur Rahman, M. Anwar Hossain, Hussein Mouftah, A. El Saddik, and Eiji Okamoto. 2010. A real-time privacy-sensitive data hiding approach based on chaos cryptography. In Proceedings of the International Conference on Multimedia and Expo. 72--77.Google ScholarGoogle ScholarCross RefCross Ref
  113. David R. Raymond, Scott F. Midkiff, Anthony Wood, and John A. Stankovic. 2008. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing 7, 1, 74--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Shahid Raza, Adriaan Slabbert, Thiemo Voigt, and Krister Landernas. 2009. Security considerations for the WirelessHART protocol. In Proceedings of the International Conference on Emerging Technologies and Factory Automation. 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Bernhard Rinner and Wayne Wolf. 2008. A bright future for distributed smart cameras. Proceedings of the IEEE 96, 10 (October 2008), 1562--1564.Google ScholarGoogle Scholar
  116. Anthony Rowe, Dhiraj Goel, and Raj Rajkumar. 2007. FireFly mosaic: A vision-enabled wireless sensor networking system. In Proceedings of the International Real-Time Systems Symposium. 459--468. Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. F. Sabahi and A. Movaghar. 2008. Intrusion detection: A survey. In Proceedings of the International Conference on Systems and Networks Communications. 23--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. Mukesh Saini, Pradeep K. Atrey, Sharad Mehrotra, Sabu Emmanuel, and Mohan S. Kankanhalli. 2010. Privacy modeling for video data publication. In Proceedings of the International Conference on Multimedia and Expo. 60--65.Google ScholarGoogle Scholar
  119. Mukesh Saini, Pradeep K. Atrey, Sharad Mehrotra, and Mohan S. Kankanhalli. 2012. Adaptive transformation for robust privacy protection in video surveillance. Advances in Multimedia, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Kimaya Sanzgiri, Daniel Laflamme, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer. 2005. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications 23, 3, 598--610. Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. Martin Schaffer and Peter Schartner. 2007. Video surveillance: A distributed approach to protect privacy. In Proceedings of the International Conference on Communications and Multimedia Security. 140--149. Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Jeremy Schiff, Marci Meingast, Deirdre K. Mulligan, Shankar Sastry, and Kenneth Y. Goldberg. 2007. Respectful cameras: Selecting visual markers in real-time to address privacy concerns. In Proceedings of the International Conference on Intelligent Robots and Systems. 971--978.Google ScholarGoogle Scholar
  123. Adolph Seema and Martin Reisslein. 2011. Towards efficient wireless video sensor networks: A survey of existing node architectures and proposal for a Flexi-WVSNP design. IEEE Communications Surveys and Tutorials 13, 3, 462--486.Google ScholarGoogle ScholarCross RefCross Ref
  124. Jaydip Sen. 2010. A survey on wireless sensor network security. International Journal of Communication Networks and Information Security 1, 2 (November 2010), 55--78.Google ScholarGoogle Scholar
  125. Andrew Senior, Sharath Pankanti, Arun Hampapur, Lisa Brown, Ying-Li Tian, Ahmet Ekin, Jonathan Connell, Chiao Fe Shu, and Max Lu. 2005. Enabling video privacy through computer vision. IEEE Security and Privacy Magazine 3, 3, 50--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. Dimitrios N. Serpanos and Andreas Papalambrou. 2008. Security and privacy in distributed smart cameras. Proceedings of the IEEE 96, 10 (October 2008), 1678--1687.Google ScholarGoogle ScholarCross RefCross Ref
  127. Stefaan Seys, Claudia Diaz, Bart De Win, Vincent Naessens, Caroline Goemans, Joris Claessens, Wim Moreau, Bart De Decker, Jos Dumortier, and Bart Preneel. 2001. APES Anonymity and Privacy in Electronic Services. Technical Report.Google ScholarGoogle Scholar
  128. Pavan Sikka, Peter Corke, Leslie Overs, Philip Valencia, and Tim Wark. 2007. Fleck: A platform for real-world outdoor sensor networks. In Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information. 709--714.Google ScholarGoogle ScholarCross RefCross Ref
  129. Dmitry Sklyarov. 2010. Forging Canon Original Decision Data. Retrieved April 2011 from http://www.elcomsoft.com/canon.html.Google ScholarGoogle Scholar
  130. Hui Song, Sencun Zhu, and Guohong Cao. 2007. Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5, 1 (January 2007), 112--125.Google ScholarGoogle ScholarCross RefCross Ref
  131. Stanislava Soro and Wendi B. Heinzelman. 2009. A survey of visual sensor networks. Advances in Multimedia 2009 (May 2009), 21.Google ScholarGoogle Scholar
  132. Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc van Gool, and Andreas Steffen. 2006. Privacy in video surveilled areas. In Proceedings of the International Conference on Privacy, Security and Trust. 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. Kun Sun, Peng Ning, Cliff Wang, An Liu, and Yuzheng Zhou. 2006. TinySeRSync: Secure and resilient time synchronization in wireless sensor networks. In Proceedings of the Conference on Computer and Communications Security. 14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. Bharath Sundararaman, Ugo Buy, and Ajay D. Kshemkalyani. 2005. Clock synchronization for wireless sensor networks: A survey. Ad Hoc Networks 3, 4, 281--323.Google ScholarGoogle ScholarCross RefCross Ref
  135. Y. Sutcu, S. Bayram, H. T. Sencar, and Nasir Memon. 2007. Improvements on sensor noise based source camera identification. In Proceedings of the International Conference on Multimedia and Expo. 24--27.Google ScholarGoogle ScholarCross RefCross Ref
  136. Hailun Tan, Wan Hu, and Sanjay Jha. 2010. A hardware-based remote attestation protocol in wireless sensor networks. In Proceedings of the International Conference on Information Processing in Sensor Networks. 378--379. Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. Suriyon Tansuriyavong and Shinichi Hanaki. 2001. Privacy protection by concealing persons in circumstantial video image. In Proceedings of the Workshop on Perceptive User Interfaces. 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. Kinh Tieu, Gerald Dalley, and W. Eric L. Grimson. 2005. Inference of non-overlapping camera network topology by measuring statistical dependence. In Proceedings of the International Conference on Computer Vision. 1842--1849. Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. Juan R. Troncoso-Pastoriza, Luis Pérez-Freire, and Fernando Pérez-González. 2009. Videosurveillance and privacy: Covering the two sides of the mirror with DRM. In Proceedings of the Workshop on Digital Rights Management. 83--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. Khai N. Truong, Shwetak N. Patel, Jay W. Summet, and Gregory D. Abowd. 2005. Preventing camera recording by designing a capture-resistant environment. In Proceedings of the International Conference on Ubiquitous Computing. 73--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. Trusted Computing Group. 2011. TPM Main Specification 1.2, Level 2, Revision 116. Retrieved October 2013 from http://www.trustedcomputinggroup.org/resources/tpm_main_specification.Google ScholarGoogle Scholar
  142. Hauke Vagts and Alexander Bauer. 2010. Privacy-aware object representation for surveillance systems. In Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance. 601--608. Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. Hauke Vagts and Jürgen Beyerer. 2009. Security and privacy challenges in modern surveillance systems. In Proceedings of the Future Security Research Conference. 94--116.Google ScholarGoogle Scholar
  144. Senem Velipasalar, Jason Schlessman, Cheng-yao Chen, Wayne Wolf, and Jaswinder Pal Singh. 2006. SCCS: A scalable clustered camera system for multiple object tracking communicating via message passing interface. In Proceedings of the International Conference on Multimedia and Expo. 277--280.Google ScholarGoogle ScholarCross RefCross Ref
  145. David Wagner. 2004. Resilient aggregation in sensor networks. In Proceedings of the Workshop on Security of Ad Hoc and Sensor Networks. 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. Yong Wang, Garhan Attebury, and Byrav Ramamurthy. 2006. A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials 8, 2, 2--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. Dirk Westhoff, Joao Girao, and Mithun Acharya. 2006. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing 5, 10, 1417--1431. Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. Jehan Wickramasuriya, Mahesh Datt, Sharad Mehrotra, and Nalini Venkatasubramanian. 2004. Privacy protecting data collection in media spaces. In Proceedings of the International Conference on Multimedia. 48--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. Thomas Winkler and Bernhard Rinner. 2010a. TrustCAM: Security and privacy-protection for an embedded smart camera based on trusted computing. In Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance. 593--600. Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. Thomas Winkler and Bernhard Rinner. 2010b. User-based attestation for trustworthy visual sensor networks. In Proceedings of the International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. Thomas Winkler and Bernhard Rinner. 2011. Securing embedded smart cameras with trusted computing. EURASIP Journal on Wireless Communications and Networking 2011, 20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. Thomas Winkler and Bernhard Rinner. 2012. User centric privacy awareness in video surveillance. Multimedia Systems Journal 18, 2, 99--121.Google ScholarGoogle ScholarCross RefCross Ref
  153. Thomas Winkler and Bernhard Rinner. 2013. Sensor-level security and privacy protection by embedding video content analysis. In Proceedings of the International Conference on Digital Signal Processing. 6.Google ScholarGoogle ScholarCross RefCross Ref
  154. Johannes Winter. 2008. Trusted computing building blocks for embedded Linux-based arm trustzone platforms. In Proceedings of the Workshop on Scalable Trusted Computing. 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. Wayne Wolf, Burak Ozer, and Tiehan Lv. 2003. Architectures for distributed smart cameras. In Proceedings of the International Conference on Multimedia and Expo. 5--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  156. Wenyuan Xu, Ke Ma, Wade Trappe, and Yanyong Zhang. 2006. Jamming sensor networks: Attack and defense strategies. IEEE Network 20, 3, 41--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. Kenichi Yabuta, Hitoshi Kitazawa, and Toshihisa Tanaka. 2005. A new concept of security camera monitoring with privacy protection by masking moving objects. In Proceedings of the International Pacific-Rim Conference on Multimedia. 831--842. Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. Shuiming Ye, Ying Luo, Jian Zhao, and Sen-Ching Samson Cheung. 2009. Anonymous biometric access control. EURASIP Journal on Information Security 2009, 18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. Suyoung Yoon, Chanchai Veerarittiphan, and Mihail L. Sichitiu. 2007. Tiny-sync: Tight time synchronization for wireless sensor networks. ACM Transactions on Sensor Networks 3, 2, 1--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  160. Yun Zhou, Yuguang Fang, and Yanchao Zhang. 2008. Securing wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials 10, 3, 6--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  161. Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. 2006. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2, 4, 500--528. Google ScholarGoogle ScholarDigital LibraryDigital Library
  162. ZigBee Alliance. 2012. ZigBee Consortium Web Site. Retrieved October 2013 from http://www.zigbee.org/.Google ScholarGoogle Scholar

Index Terms

  1. Security and Privacy Protection in Visual Sensor Networks: A Survey

      Recommendations

      Reviews

      Soon Ae Chun

      Visual sensor networks (VSNs) consist of devices with image sensors and with processing and networking capabilities, to monitor large quantities of images of people, automobiles, and so on. VSNs amplify the core nature of the surveillance society with widespread application areas such as environmental monitoring, smart homes and meeting rooms, elder care, and assisted living. The network of cameras can collect data that can be analyzed to identify the identities, behaviors, interaction patterns, and personal preferences of individuals. A proper set of security and privacy mechanisms should be understood and implemented for the VSNs. The authors use a holistic approach by categorizing the security requirements and related studies by each component in the VSN, namely, node-centric security, data-centric security, network-centric security, as well as user-centric security. Data-centric security requirements include nonrepudiation and confidentiality, thus protection approaches address data confidentiality, integrity, authenticity, as well as correct timestamping and location requirements. The data-level approaches also address privacy and access authorization to meet the confidentiality requirements. The node-centric security approaches address availability, physical security, and code security requirements. The network-centric security approaches try to address channel security with the network data confidentiality, integrity, availability, and freshness security requirements, as well as the collaboration security requirements to prevent routing attacks, time synchronization attacks, data sharing, and aggregation attacks. The user-centric security approaches handle issues such as user awareness and consent when the user is monitored and his or her data is shared, and feedback and control mechanisms to allow the end users to have a way to provide feedback on the usage or control of their own data. The authors have analyzed and categorized a vast number of publications on VSN security and privacy requirements, issues, and approaches using this holistic approach. This can be a useful resource for academics and students, as well as industry professionals to gain knowledge on the security requirements specific to each component of a VSN and its related security and privacy protection approaches. Online Computing Reviews Service

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 47, Issue 1
        July 2014
        551 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/2620784
        Issue’s Table of Contents

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 May 2014
        • Accepted: 1 November 2013
        • Revised: 1 July 2013
        • Received: 1 January 2013
        Published in csur Volume 47, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader