Abstract
Visual sensor networks (VSNs) are receiving a lot of attention in research, and at the same time, commercial applications are starting to emerge. VSN devices come with image sensors, adequate processing power, and memory. They use wireless communication interfaces to collaborate and jointly solve tasks such as tracking persons within the network. VSNs are expected to replace not only many traditional, closed-circuit surveillance systems but also to enable emerging applications in scenarios such as elderly care, home monitoring, or entertainment. In all of these applications, VSNs monitor a potentially large group of people and record sensitive image data that might contain identities of persons, their behavior, interaction patterns, or personal preferences. These intimate details can be easily abused, for example, to derive personal profiles.
The highly sensitive nature of images makes security and privacy in VSNs even more important than in most other sensor and data networks. However, the direct use of security techniques developed for related domains might be misleading due to the different requirements and design challenges. This is especially true for aspects such as data confidentiality and privacy protection against insiders, generating awareness among monitored people, and giving trustworthy feedback about recorded personal data—all of these aspects go beyond what is typically required in other applications.
In this survey, we present an overview of the characteristics of VSN applications, the involved security threats and attack scenarios, and the major security challenges. A central contribution of this survey is our classification of VSN security aspects into data-centric, node-centric, network-centric, and user-centric security. We identify and discuss the individual security requirements and present a profound overview of related work for each class. We then discuss privacy protection techniques and identify recent trends in VSN security and privacy. A discussion of open research issues concludes this survey.
- Najwa Aaraj, Anand Raghunathan, and Niraj K. Jha. 2008. Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Transactions on Embedded Computing Systems 8, 1, 1--31. Google ScholarDigital Library
- Hamid Aghajan, Juan Carlos Augusto, Chen Wu, Paul Mccullagh, and Julie-Ann Walkden. 2007. Distributed vision-based accident management for assisted living. In Proceedings of the International Conference on Smart Homes and Health Telematics. 196--205. Google ScholarDigital Library
- Kwabene W. Agyeman and Anthony Rowe. 2012. CMUcam4 Feature List. Technical Report.Google Scholar
- Ian F. Akyildiz, Tommaso Melodia, and Kaushik R. Chowdhury. 2007. A survey on wireless multimedia sensor networks. Computer Networks 51, 4, 921--960. Google ScholarDigital Library
- M. G. Albanesi, M. Ferretti, and F. Guerrini. 2001. A taxonomy for image authentication techniques and its application to the current state of the art. In Proceedings of the International Conference on Image Analysis and Processing. 535--540. Google ScholarDigital Library
- Hani Alzaid, Ernest Foo, and Juan Gonzales Nieto. 2007. Secure data aggregation in wireless sensor network: A survey. In Proceedings of the Australasian Information Security Conference. 13. Google ScholarDigital Library
- ARM Limited. 2009. ARM Security Technology: Building a Secure System Using TrustZone Technology. Technical Report.Google Scholar
- Clemens Arth, Horst Bischof, and Christian Leistner. 2006. TRICam: An embedded platform for remote traffci surveillance. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop. 125--133. Google ScholarDigital Library
- Pradeep K. Atrey, Wei-Qi Yan, Ee-Chien Chang, and Mohan S. Kankanhalli. 2004. A hierarchical signature scheme for robust video authentication using secret sharing. In Proceedings of the International Conference on Multimedia Modelling. 330--337. Google ScholarDigital Library
- Pradeep K. Atrey, Wei-Qi Yan, and Mohan S. Kankanhalli. 2006. A scalable signature scheme for video authentication. Multimedia Tools and Applications 34, 1, 107--135. Google ScholarDigital Library
- Jerome Azema and Gilles Fayad. 2008. M-Shield Mobile Security Technology: Making Wireless Secure. Technical Report. Texas Instruments.Google Scholar
- Nadia Baaziz, Nathalie Lolo, Oscar Padilla, and Felix Petngang. 2007. Security and privacy protection for automated video surveillance. In Proceedings of the International Symposium on Signal Processing and Information Technology. 17--22.Google ScholarCross Ref
- Athanasios Bamis, Dimitrios Lymberopoulos, Thiago Teixeira, and Andreas Savvides. 2010. The BehaviorScope framework for enabling ambient assisted living. Personal and Ubiquitous Computing 14, 6 (March 2010), 473--487. Google ScholarDigital Library
- Franco Bartolini, Anastasios Tefas, Mauro Barni, and Ioannis Pitas. 2001. Image authentication techniques for surveillance applications. Proceedings of the IEEE 89, 10, 1403--1418.Google ScholarCross Ref
- Horst Bischof, Martin Godec, Christian Leistner, Bernhard Rinner, and Andreas Starzacher. 2010. Autonomous audio-supported learning of visual classifiers for traffic monitoring. IEEE Intelligent Systems 25, 3, 15--23. Google ScholarDigital Library
- Azzedine Boukerche and Damla Turgut. 2007. Secure time synchronization protocols for wireless sensor networks. IEEE Wireless Communications 14, 5, 64--69. Google ScholarDigital Library
- Terrance Edward Boult. 2005. PICO: Privacy through invertible cryptographic obscuration. In Proceedings of the Workshop on Computer Vision for Interactive and Intelligent Environments. 27--38. Google ScholarDigital Library
- Michael Boyle, Christopher Edwards, and Saul Greenberg. 2000. The effects of filtered video on awareness and privacy. In Proceedings of the Conference on Computer Supported Cooperative Work. 1--10. Google ScholarDigital Library
- Michael Bramberger, Josef Brunner, Bernhard Rinner, and Helmut Schwabach. 2004. Real-time video analysis on an embedded smart camera for traffic surveillance. In IEEE Real-Time and Embedded Technology and Applications Symposium. 174--181. Google ScholarDigital Library
- Jack Brassil. 2005. Using mobile communications to assert privacy from video surveillance. In Proceedings of the Parallel and Distributed Processing Symposium. 8. Google ScholarDigital Library
- William M. Bulkeley. 2009. Chicago's Camera Network Is Everywhere. Retrieved March 2012 from http://online.wsj.com/article/SB100014240527487045384045745399104128247 56.html.Google Scholar
- Claude Castelluccia, Aldar C-F. Chan, Einar Mykletun, and Gene Tsudik. 2009. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks 5, 3 (May 2009), 1--36. Google ScholarDigital Library
- Andrea Cavallaro. 2004. Adding privacy constraints to video-based applications. In Proceedings of the European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology. 8.Google Scholar
- Andrea Cavallaro. 2007. Privacy in video surveillance. IEEE Signal Processing Magazine 24, 2 (March 2007), 168--169.Google ScholarCross Ref
- Ann Cavoukian. 2013a. Privacy by Design Centre of Excellence. Ph.D. Dissertation. Information & Privacy Commissioner Ontario, Canada.Google Scholar
- Ann Cavoukian. 2013b. Surveillance, Then and Now: Securing Privacy in Public Spaces. Technical Report.Google Scholar
- Haowen Chan and Adrian Perrig. 2003. Security and privacy in sensor networks. IEEE Computer 36, 10, 103--105. Google ScholarDigital Library
- Haowen Chan, Adrian Perrig, and Dawn Song. 2006. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of the International Conference on Computer and Communications Security. 1--10. Google ScholarDigital Library
- Ankur Chattopadhyay and Terrance Edward Boult. 2007. PrivacyCam: A privacy preserving camera using uCLinux on the Blackfin DSP. In Proceedings of the International Conference on Computer Vision and Pattern Recognition. 1--8.Google ScholarCross Ref
- Datong Chen, Yi Chang, Rong Yan, and Jie Yang. 2007. Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Applied Signal Processing 2007, 1, 107--116. Google ScholarDigital Library
- Mo Chen, Jessica Fridrich, Miroslav Goljan, and Jan Lukás. 2008. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 3, 1, 74--90. Google ScholarDigital Library
- Phoebus Wei-Chih Chen, Parvez Ahammad, Colby Boyer, Shih-I Huang, Leon Lin, Edgar J. Lobaton, Marci Lenore Meingast, Songhwai Oh, Simon Wang, Posu Yan, Allen Yang, Chuohao Yeo, Lung-Chung Chang, Doug Tygar, and S. Shankar Sastry. 2008. CITRIC: A low-bandwidth wireless camera network platform. In Proceedings of the International Conference on Distributed Smart Cameras. 10.Google Scholar
- Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou. 2009. Sensor network security: A survey. IEEE Communications Surveys and Tutorials 11, 2, 52--73. Google ScholarDigital Library
- Sen-Ching Samson Cheung, Jithendra K. Paruchuri, and Thinh P. Nguyen. 2008. Managing privacy data in pervasive camera networks. In Proceedings of the International Conference on Image Processing. 1676--1679.Google Scholar
- Sen-Ching Samson Cheung, Jian Zhao, and M Vijay Venkatesh. 2006. Efficient object-based video inpainting. In Proceedings of the International Conference on Image Processing. 705--708.Google Scholar
- Kenta Chinomi, Naoko Nitta, Yoshimichi Ito, and Noboru Babaguchi. 2008. PriSurv: Privacy protected video surveillance system using adaptive visual abstraction. In Proceedings of the International Multimedia Modeling Conference. 144--154. Google ScholarDigital Library
- Rita Cucchiara, Massimo Piccardi, and Paola Mello. 2000. Image analysis and rule-based reasoning for a traffic monitoring system. IEEE Transactions on Intelligent Transportation Systems 1, 2 (June 2000), 119--130. Google ScholarDigital Library
- Jing Deng, R. Han, and Shivakant Mishra. 2006. INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications 29, 2 (January 2006), 216--230. Google ScholarDigital Library
- Tim Dierks and Christopher Allen. 1999. RFC 2246: The TLS Protocol. Retrieved April 2014 from http://www.ietf.org/rfc/rfc2246.txt.Google Scholar
- Kurt Dietrich and Johannes Winter. 2009. Implementation aspects of mobile and embedded trusted computing. In Proceedings of the International Conference on Trust and Trustworthy Computing. 29--44. Google ScholarDigital Library
- Kurt Dietrich and Johannes Winter. 2010. Towards customizable, application specific mobile trusted modules. In Proceedings of the Workshop on Scalable Trusted Computing. 31--40. Google ScholarDigital Library
- Akshay Dua, Nirupama Bulusu, Wu-Chang Feng, and Wen Hu. 2009. Towards trustworthy participatory sensing. In Proceedings of the USENIX Workshop on Hot Topics in Security. 6. Google ScholarDigital Library
- Frédéric Dufaux and Touradj Ebrahimi. 2006. Scrambling for video surveillance with privacy. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop. 160--166. Google ScholarDigital Library
- Frédéric Dufaux and Touradj Ebrahimi. 2010. A framework for the validation of privacy protection solutions in video surveillance. In Proceedings of the International Conference on Multimedia and Expo. 66--71.Google ScholarCross Ref
- Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, and Marko Wolf. 2007. Reconfigurable trusted computing in hardware. In Proceedings of the Workshop on Scalable Trusted Computing. 15--20. Google ScholarDigital Library
- Jan-Erik Ekberg and Markus Kylänpää. 2007. Mobile Trusted Module (MTM)—An Introduction. Technical Report NRC-TR-2007-015. Nokia Research Center.Google Scholar
- Jeremy Elson and Kay Römer. 2002. Wireless sensor networks: A new regime for time synchronization. In Proceedings of the Workshop on Hot Topics in Networks. 6.Google Scholar
- Ádám Erdélyi, Thomas Winkler, and Bernhard Rinner. 2013. Serious fun: Cartooning for privacy protection. In Proceedings of the MediaEval Workshop. 2.Google Scholar
- Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, and Tomas Toft. 2009. Privacy-preserving face recognition. In Proceedings of the International Symposium on Privacy Enhancing Technologies. 235--253. Google ScholarDigital Library
- Zekeriya Erkin, Alessandro Piva, Stefan Katzenbeisser, R. L. Lagendijk, Jamshid Shokrollahi, Gregory Neven, and Mauro Barni. 2007. Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security 2007, 20. Google ScholarDigital Library
- Dan Farmer and Charles C. Mann. 2003. Surveillance nation (part I). Technology Review 4, 34--43.Google Scholar
- Douglas A. Fidaleo, Hoang-Anh Nguyen, and Mohan Trivedi. 2004. The Networked Sensor Tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In Proceedings of the International Workshop on Video Surveillance and Sensor Networks. 46--53. Google ScholarDigital Library
- Sven Fleck and Wolfgang Straßer. 2008. Smart camera based monitoring system and its application to assisted living. Proceedings of the IEEE 96, 10, 1698--1714.Google ScholarCross Ref
- Sven Fleck and Wolfgang Straßer. 2010. Towards secure and privacy sensitive surveillance. In Proceedings of the International Conference on Distributed Smart Cameras. 7. Google ScholarDigital Library
- Gary L. Friedman. 1993. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics 39, 4, 905--910. Google ScholarDigital Library
- Saurabh Ganeriwal, Ram Kumar, and Mani B. Srivastava. 2003. Time-sync protocols for sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems. 12. Google ScholarDigital Library
- Saurabh Ganeriwal, Christina Pöepper, Srdjan Capkun, and Mani B. Srivastava. 2008. Secure time synchronization in sensor networks. ACM Transactions on Sensor Networks 11, 4, 1--35. Google ScholarDigital Library
- Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, and Jürgen Becker. 2008a. A system architecture for reconfigurable trusted platforms. In Proceedings of the Conference on Design, Automation and Test in Europe. 541--544. Google ScholarDigital Library
- Benjamin Glas, Alexander Klimm, David Schwab, Klaus D. Müller-Glaser, and Jürgen Becker. 2008b. A prototype of trusted platform functionality on reconfigurable hardware for bitstream updates. In Proceedings of the International Symposium on Rapid System Prototyping. 135--141. Google ScholarDigital Library
- Ralph Gross, Latanya Sweeney, Fernando De Torre, and Simon Baker. 2006. Model-based face de-identification. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop. 8. Google ScholarDigital Library
- Ulrich Grossmann, Enrik Berkhan, Luciana C. Jatoba, Joerg Ottenbacher, Wilhelm Stork, and Klaus D. Müller-Glaser. 2007. Security for mobile low power nodes in a personal area network by means of trusted platform modules. In Proceedings of the Workshop on Security and Privacy in Ad Hoc and Sensor Networks. 172--186. Google ScholarDigital Library
- Arun Hampapur. 2008. Smart video surveillance for proactive security. IEEE Signal Processing Magazine 25, 4 (July 2008), 134--136.Google ScholarCross Ref
- Arun Hampapur, S. Borger, Lisa Brown, C. Carlson, Jonathan Connell, Max Lu, Andrew Senior, V. Reddy, Chiao Fe Shu, and Ying-Li Tian. 2007. S3: The IBM smart surveillance system: From transactional systems to observational systems. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing. 1385--1388.Google ScholarCross Ref
- HART Communication Foundation. 2010. WirelessHART Security Overview. Retrieved October 2013 from http://www.hartcomm.org/.Google Scholar
- Dajun He, Qibin Sun, and Qi Tian. 2004. A secure and robust object-based video authentication system. EURASIP Journal on Advances in Signal Processing 2004, 14, 2185--2200. Google ScholarDigital Library
- Frank Helten and Bernd Fischer. 2004. What Do People Think about CCTV? Findings from a Berlin Survey. Technical Report. Berlin Institute for Social Research.Google Scholar
- Martin Hoffmann, Michael Wittke, Yvonne Bernard, Ramin Soleymani, and Jörg Hähner. 2008. DMCTRAC: Distributed multi camera tracking. In Proceedings of the International Conference on Distributed Smart Cameras. 10.Google ScholarCross Ref
- Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei. 2011. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. In Proceedings of SPIE. 12.Google Scholar
- Wen Hu, Peter Corke, Wen Chan Shih, and Leslie Overs. 2009. secFleck: A public key technology platform for wireless sensor networks. In Proceedings of the European Conference on Wireless Sensor Networks. 296--311. Google ScholarDigital Library
- Wen Hu, Hailun Tan, Peter Corke, Wen Chan Shih, and Sanjay Jha. 2010. Toward trusted wireless sensor networks. ACM Transactions on Sensor Networks 7, 1 (August 2010), 25. Google ScholarDigital Library
- Yih-Chun Hu, Adrian Perrig, and David B. Johnson. 2005. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11, 1--2 (January 2005), 21--38. Google ScholarDigital Library
- ISA100 Wireless Compliance Institute. 2011. ISA-100.11.a Wireless Standard. Retrieved October 2013 from http://www.isa100wci.org/.Google Scholar
- Peyman Kabiri and Ali A. Ghorbani. 2005. Research on intrusion detection and response: A survey. International Journal of Network Security 1, 2, 84--102.Google Scholar
- Chris Karlof, Neveen Sastry, and David Wagner. 2004. TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems. 162--175. Google ScholarDigital Library
- Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1, 2--3, 293--315.Google ScholarCross Ref
- Vladimir Katalov. 2011. Nikon Image Authentication System: Compromised. Retrieved March 2012 from http://www.elcomsoft.com/nikon.html.Google Scholar
- Pavel Korshunov, C. Araimo, Francesca Desimone Simone, C. Velardo, J.-L. Dugelay, and Touradj Ebrahimi. 2012a. Subjective study of privacy filters in video surveillance. In Proceedings of the International Workshop on Multimedia Signal Processing. 5.Google ScholarCross Ref
- Pavel Korshunov, Shuting Cai, and Touradj Ebrahimi. 2012b. Crowdsourcing approach for evaluation of privacy filters in video surveillance. In Proceedings of the International Workshop on Crowdsourcing for Multimedia. 6. Google ScholarDigital Library
- Pavel Korshunov and Touradj Ebrahimi. 2013. Using warping for privacy protection in video surveillance. In Proceedings of the International Conference on Digital Signal Processing. 6.Google ScholarCross Ref
- Kari Kostiainen, N. Asokan, and Jan-Erik Ekberg. 2011. Practical property-based attestation on mobile devices. In Proceedings of the International Conference on Trust and Trustworthy Computing. 78--92. Google ScholarDigital Library
- Stefan Krempl and Andreas Wilkens. 2011. Datenschützer beanstanden Videoüberwachung in ECE-Einkaufszentren.Retrieved March 2013 from http://heise.de/-1187205.Google Scholar
- Reginald L. Lagendijk, Zekeriya Erkin, and Mauro Barni. 2013. Encrypted signal processing for privacy protection. IEEE Signal Processing Magazine 30, 1, 82--105.Google ScholarCross Ref
- Chang-tsun Li. 2010. Source camera identification using enhanced sensor pattern noise. IEEE Transactions on Information Forensics and Security 5, 2 (June 2010), 280--287. Google ScholarDigital Library
- Guangzhen Li, Yoshimichi Ito, Xiaoyi Yu, Naoko Nitta, and Noboru Babaguchi. 2009. Recoverable privacy protection for video content distribution. EURASIP Journal on Information Security 2009, 11. Google ScholarDigital Library
- Ying Luo, Shuiming Ye, and Sen-Ching Samson Cheung. 2010. Anonymous subject identification in privacy-aware video surveillance. In Proceedings of the International Conference on Multimedia and Expo. 83--88.Google ScholarCross Ref
- Michael Manzo, Tanya Roosta, and Shankar Sastry. 2005. Time synchronization attacks in sensor networks. In Proceedings of the Workshop on Security of Ad Hoc and Sensor Networks. 10. Google ScholarDigital Library
- Andrew Martin. 2008. The Ten Page Introduction to Trusted Computing. Technical Report RR-08-11. Oxford University Computing Laboratory.Google Scholar
- Isabel Martínez-Ponte, Xavier Desurmont, Jerome Meessen, and Jean-François Delaigle. 2005. Robust human face hiding ensuring privacy. In Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services. 4.Google Scholar
- Nasir Memon and Ping Wah Wong. 1998. Protecting digital media content. Communications of the ACM 41, 7 (July 1998), 35--43. Google ScholarDigital Library
- Christian Micheloni, Gian Luca Foresti, and Lauro Snidaro. 2005. A network of co-operative cameras for visual surveillance. IEEE Proceedings on Vision, Image and Signal Processing 152, 2, 205--212.Google ScholarCross Ref
- Saraju P. Mohanty. 2009. A secure digital camera architecture for integrated real-time digital rights management. Journal of Systems Architecture 55, 10--12 (October 2009), 468--480. Google ScholarDigital Library
- Simon Moncrieff, Svetha Venkatesh, and Geoff West. 2009. Dynamic privacy in public surveillance. IEEE Computer 42, 9 (September 2009), 22--28. Google ScholarDigital Library
- Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, and Grammati Pantziou. 2009. A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys and Tutorials 11, 4, 1--14. Google ScholarDigital Library
- Steven Ney and Kurt Pichler. 2002. Video Surveillance in Austria. Technical Report. Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria.Google Scholar
- Clive Norris. 2009. A Review of the Increased Use of CCTV and Video-Surveillance for Crime Prevention Purposes in Europe. Technical Report. Department of Sociological Studies, University of Sheffield, United Kingdom.Google Scholar
- Vladimir A. Oleshchuk. 2007. Privacy preserving monitoring and surveillance in sensor networks. In Proceedings of the Frontiers of High Performance Computing and Networking Workshops. Lecture Notes in Computer Science, Vol. 4743. 485--492. Google ScholarDigital Library
- OpenStreetMap.org. 2011. OpenStreetMap.org Video Surveillance Camera Overlay. Retrieved April 2011 from http://osm.vdska.de/.Google Scholar
- Sddka Berna Örs, Gürkaynak Frank, Elisabeth Oswald, and Bart Preneel. 2004. Power-analysis attack on an ASIC AES implementation. In Proceedings of the International Conference on Information Technology: Coding and Computing. 2--8. Google ScholarDigital Library
- OWNI. 2011. CCTV Camera Positions in Paris. Retrieved March 2012 from http://app.owni.fr/camera-paris/.Google Scholar
- Suat Ozdemir and Yang Xiao. 2009. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks 53, 12 (August 2009), 2022--2037. Google ScholarDigital Library
- Adrian Perrig, Ran Canetti, J. D. Tygar, and Dawn Song. 2002. The TESLA broadcast authentication protocol. RSA Cryptobytes 5.Google Scholar
- Adrian Perrig, John A. Stankovic, and David Wagner. 2004. Security in wireless sensor networks. Communications of the ACM 47, 6, 53--57. Google ScholarDigital Library
- Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler. 2002. SPINS: Security protocols for sensor networks. Wireless Networks 8, 5, 521--534. Google ScholarDigital Library
- Alvaro Pinto. 2011. Wireless Embedded Smart Cameras: Performance Analysis and Their Application to Fall Detection for Eldercare. Ph.D. Dissertation.Google Scholar
- Thomas Popp, Stefan Mangard, and Elisabeth Oswald. 2007. Power analysis attacks and countermeasures. IEEE Design and Test of Computers 24, 6, 535--543. Google ScholarDigital Library
- Christina Pöpper, Mario Strasser, and Srdjan Capkun. 2010. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications 28, 5, 1--13. Google ScholarDigital Library
- Prefecture de Police. 2010. Plan de Vidéoprotection pour Paris. Technical Report.Google Scholar
- Markus Quaritsch, Markus Kreuzthaler, Bernhard Rinner, Horst Bischof, and Bernhard Strobl. 2007. Autonomous multicamera tracking on embedded smart cameras. EURASIP Journal on Embedded Systems 2007, 1, 10. Google ScholarDigital Library
- Jean-Jacques Quisquater, Benoit Macq, Marc Joye, N. Degand, and A. Bernard. 1997. Practical solution to authentication of images with a secure camera. Storage and Retrieval for Image and Video Databases 3022, 1, 290--297.Google ScholarCross Ref
- Faisal Z. Qureshi. 2009. Object-video streams for preserving privacy in video surveillance. In Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance. 442--447. Google ScholarDigital Library
- Mohammad Rahimi, Rick Baer, Obimdinachi I. Iroezi, Juan C. Garcia, Jay Warrior, Deborah Estrin, and Mani B. Srivastava. 2005. Cyclops: In situ image sensing and interpretation in wireless sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems. 13. Google ScholarDigital Library
- Mizanur Rahman, M. Anwar Hossain, Hussein Mouftah, A. El Saddik, and Eiji Okamoto. 2010. A real-time privacy-sensitive data hiding approach based on chaos cryptography. In Proceedings of the International Conference on Multimedia and Expo. 72--77.Google ScholarCross Ref
- David R. Raymond, Scott F. Midkiff, Anthony Wood, and John A. Stankovic. 2008. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing 7, 1, 74--81. Google ScholarDigital Library
- Shahid Raza, Adriaan Slabbert, Thiemo Voigt, and Krister Landernas. 2009. Security considerations for the WirelessHART protocol. In Proceedings of the International Conference on Emerging Technologies and Factory Automation. 8. Google ScholarDigital Library
- Bernhard Rinner and Wayne Wolf. 2008. A bright future for distributed smart cameras. Proceedings of the IEEE 96, 10 (October 2008), 1562--1564.Google Scholar
- Anthony Rowe, Dhiraj Goel, and Raj Rajkumar. 2007. FireFly mosaic: A vision-enabled wireless sensor networking system. In Proceedings of the International Real-Time Systems Symposium. 459--468. Google ScholarDigital Library
- F. Sabahi and A. Movaghar. 2008. Intrusion detection: A survey. In Proceedings of the International Conference on Systems and Networks Communications. 23--26. Google ScholarDigital Library
- Mukesh Saini, Pradeep K. Atrey, Sharad Mehrotra, Sabu Emmanuel, and Mohan S. Kankanhalli. 2010. Privacy modeling for video data publication. In Proceedings of the International Conference on Multimedia and Expo. 60--65.Google Scholar
- Mukesh Saini, Pradeep K. Atrey, Sharad Mehrotra, and Mohan S. Kankanhalli. 2012. Adaptive transformation for robust privacy protection in video surveillance. Advances in Multimedia, 1--10. Google ScholarDigital Library
- Kimaya Sanzgiri, Daniel Laflamme, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer. 2005. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications 23, 3, 598--610. Google ScholarDigital Library
- Martin Schaffer and Peter Schartner. 2007. Video surveillance: A distributed approach to protect privacy. In Proceedings of the International Conference on Communications and Multimedia Security. 140--149. Google ScholarDigital Library
- Jeremy Schiff, Marci Meingast, Deirdre K. Mulligan, Shankar Sastry, and Kenneth Y. Goldberg. 2007. Respectful cameras: Selecting visual markers in real-time to address privacy concerns. In Proceedings of the International Conference on Intelligent Robots and Systems. 971--978.Google Scholar
- Adolph Seema and Martin Reisslein. 2011. Towards efficient wireless video sensor networks: A survey of existing node architectures and proposal for a Flexi-WVSNP design. IEEE Communications Surveys and Tutorials 13, 3, 462--486.Google ScholarCross Ref
- Jaydip Sen. 2010. A survey on wireless sensor network security. International Journal of Communication Networks and Information Security 1, 2 (November 2010), 55--78.Google Scholar
- Andrew Senior, Sharath Pankanti, Arun Hampapur, Lisa Brown, Ying-Li Tian, Ahmet Ekin, Jonathan Connell, Chiao Fe Shu, and Max Lu. 2005. Enabling video privacy through computer vision. IEEE Security and Privacy Magazine 3, 3, 50--57. Google ScholarDigital Library
- Dimitrios N. Serpanos and Andreas Papalambrou. 2008. Security and privacy in distributed smart cameras. Proceedings of the IEEE 96, 10 (October 2008), 1678--1687.Google ScholarCross Ref
- Stefaan Seys, Claudia Diaz, Bart De Win, Vincent Naessens, Caroline Goemans, Joris Claessens, Wim Moreau, Bart De Decker, Jos Dumortier, and Bart Preneel. 2001. APES Anonymity and Privacy in Electronic Services. Technical Report.Google Scholar
- Pavan Sikka, Peter Corke, Leslie Overs, Philip Valencia, and Tim Wark. 2007. Fleck: A platform for real-world outdoor sensor networks. In Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information. 709--714.Google ScholarCross Ref
- Dmitry Sklyarov. 2010. Forging Canon Original Decision Data. Retrieved April 2011 from http://www.elcomsoft.com/canon.html.Google Scholar
- Hui Song, Sencun Zhu, and Guohong Cao. 2007. Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5, 1 (January 2007), 112--125.Google ScholarCross Ref
- Stanislava Soro and Wendi B. Heinzelman. 2009. A survey of visual sensor networks. Advances in Multimedia 2009 (May 2009), 21.Google Scholar
- Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc van Gool, and Andreas Steffen. 2006. Privacy in video surveilled areas. In Proceedings of the International Conference on Privacy, Security and Trust. 10. Google ScholarDigital Library
- Kun Sun, Peng Ning, Cliff Wang, An Liu, and Yuzheng Zhou. 2006. TinySeRSync: Secure and resilient time synchronization in wireless sensor networks. In Proceedings of the Conference on Computer and Communications Security. 14. Google ScholarDigital Library
- Bharath Sundararaman, Ugo Buy, and Ajay D. Kshemkalyani. 2005. Clock synchronization for wireless sensor networks: A survey. Ad Hoc Networks 3, 4, 281--323.Google ScholarCross Ref
- Y. Sutcu, S. Bayram, H. T. Sencar, and Nasir Memon. 2007. Improvements on sensor noise based source camera identification. In Proceedings of the International Conference on Multimedia and Expo. 24--27.Google ScholarCross Ref
- Hailun Tan, Wan Hu, and Sanjay Jha. 2010. A hardware-based remote attestation protocol in wireless sensor networks. In Proceedings of the International Conference on Information Processing in Sensor Networks. 378--379. Google ScholarDigital Library
- Suriyon Tansuriyavong and Shinichi Hanaki. 2001. Privacy protection by concealing persons in circumstantial video image. In Proceedings of the Workshop on Perceptive User Interfaces. 4. Google ScholarDigital Library
- Kinh Tieu, Gerald Dalley, and W. Eric L. Grimson. 2005. Inference of non-overlapping camera network topology by measuring statistical dependence. In Proceedings of the International Conference on Computer Vision. 1842--1849. Google ScholarDigital Library
- Juan R. Troncoso-Pastoriza, Luis Pérez-Freire, and Fernando Pérez-González. 2009. Videosurveillance and privacy: Covering the two sides of the mirror with DRM. In Proceedings of the Workshop on Digital Rights Management. 83--94. Google ScholarDigital Library
- Khai N. Truong, Shwetak N. Patel, Jay W. Summet, and Gregory D. Abowd. 2005. Preventing camera recording by designing a capture-resistant environment. In Proceedings of the International Conference on Ubiquitous Computing. 73--86. Google ScholarDigital Library
- Trusted Computing Group. 2011. TPM Main Specification 1.2, Level 2, Revision 116. Retrieved October 2013 from http://www.trustedcomputinggroup.org/resources/tpm_main_specification.Google Scholar
- Hauke Vagts and Alexander Bauer. 2010. Privacy-aware object representation for surveillance systems. In Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance. 601--608. Google ScholarDigital Library
- Hauke Vagts and Jürgen Beyerer. 2009. Security and privacy challenges in modern surveillance systems. In Proceedings of the Future Security Research Conference. 94--116.Google Scholar
- Senem Velipasalar, Jason Schlessman, Cheng-yao Chen, Wayne Wolf, and Jaswinder Pal Singh. 2006. SCCS: A scalable clustered camera system for multiple object tracking communicating via message passing interface. In Proceedings of the International Conference on Multimedia and Expo. 277--280.Google ScholarCross Ref
- David Wagner. 2004. Resilient aggregation in sensor networks. In Proceedings of the Workshop on Security of Ad Hoc and Sensor Networks. 10. Google ScholarDigital Library
- Yong Wang, Garhan Attebury, and Byrav Ramamurthy. 2006. A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials 8, 2, 2--23. Google ScholarDigital Library
- Dirk Westhoff, Joao Girao, and Mithun Acharya. 2006. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing 5, 10, 1417--1431. Google ScholarDigital Library
- Jehan Wickramasuriya, Mahesh Datt, Sharad Mehrotra, and Nalini Venkatasubramanian. 2004. Privacy protecting data collection in media spaces. In Proceedings of the International Conference on Multimedia. 48--55. Google ScholarDigital Library
- Thomas Winkler and Bernhard Rinner. 2010a. TrustCAM: Security and privacy-protection for an embedded smart camera based on trusted computing. In Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance. 593--600. Google ScholarDigital Library
- Thomas Winkler and Bernhard Rinner. 2010b. User-based attestation for trustworthy visual sensor networks. In Proceedings of the International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. 8. Google ScholarDigital Library
- Thomas Winkler and Bernhard Rinner. 2011. Securing embedded smart cameras with trusted computing. EURASIP Journal on Wireless Communications and Networking 2011, 20. Google ScholarDigital Library
- Thomas Winkler and Bernhard Rinner. 2012. User centric privacy awareness in video surveillance. Multimedia Systems Journal 18, 2, 99--121.Google ScholarCross Ref
- Thomas Winkler and Bernhard Rinner. 2013. Sensor-level security and privacy protection by embedding video content analysis. In Proceedings of the International Conference on Digital Signal Processing. 6.Google ScholarCross Ref
- Johannes Winter. 2008. Trusted computing building blocks for embedded Linux-based arm trustzone platforms. In Proceedings of the Workshop on Scalable Trusted Computing. 21--30. Google ScholarDigital Library
- Wayne Wolf, Burak Ozer, and Tiehan Lv. 2003. Architectures for distributed smart cameras. In Proceedings of the International Conference on Multimedia and Expo. 5--8. Google ScholarDigital Library
- Wenyuan Xu, Ke Ma, Wade Trappe, and Yanyong Zhang. 2006. Jamming sensor networks: Attack and defense strategies. IEEE Network 20, 3, 41--47. Google ScholarDigital Library
- Kenichi Yabuta, Hitoshi Kitazawa, and Toshihisa Tanaka. 2005. A new concept of security camera monitoring with privacy protection by masking moving objects. In Proceedings of the International Pacific-Rim Conference on Multimedia. 831--842. Google ScholarDigital Library
- Shuiming Ye, Ying Luo, Jian Zhao, and Sen-Ching Samson Cheung. 2009. Anonymous biometric access control. EURASIP Journal on Information Security 2009, 18. Google ScholarDigital Library
- Suyoung Yoon, Chanchai Veerarittiphan, and Mihail L. Sichitiu. 2007. Tiny-sync: Tight time synchronization for wireless sensor networks. ACM Transactions on Sensor Networks 3, 2, 1--33. Google ScholarDigital Library
- Yun Zhou, Yuguang Fang, and Yanchao Zhang. 2008. Securing wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials 10, 3, 6--28. Google ScholarDigital Library
- Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. 2006. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2, 4, 500--528. Google ScholarDigital Library
- ZigBee Alliance. 2012. ZigBee Consortium Web Site. Retrieved October 2013 from http://www.zigbee.org/.Google Scholar
Index Terms
- Security and Privacy Protection in Visual Sensor Networks: A Survey
Recommendations
IoT Security & Privacy: Threats and Challenges
IoTPTS '15: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and SecurityThe era of the Internet of Things (IoT) has already started and it will profoundly change our way of life. While IoT provides us many valuable benefits, IoT also exposes us to many different types of security threats in our daily life. Before the advent ...
E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks
When visual sensor networks (VSNs) enter daily life in society, they not only bring great convenience but also cause people to worry about privacy. Traditional image encryption uses the snowflake effect to protect the privacy, but this can compromise the ...
Object coverage with camera rotation in visual sensor networks
IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing ConferenceThis paper is to study the object coverage problem in visual sensor networks. When sensors equipped camera with rotating capability in the monitoring environment are deployed randomly, the images of target object with circle shape may be captured by ...
Comments