scispace - formally typeset
Journal ArticleDOI

Security and Privacy Protection in Visual Sensor Networks: A Survey

Reads0
Chats0
TLDR
An overview of the characteristics of VSN applications, the involved security threats and attack scenarios, and the major security challenges is presented, and a central contribution of this survey is the classification of V SN security aspects into data-centric, node-centred, network-focused, and user-centric security.
Abstract
Visual sensor networks (VSNs) are receiving a lot of attention in research, and at the same time, commercial applications are starting to emerge. VSN devices come with image sensors, adequate processing power, and memory. They use wireless communication interfaces to collaborate and jointly solve tasks such as tracking persons within the network. VSNs are expected to replace not only many traditional, closed-circuit surveillance systems but also to enable emerging applications in scenarios such as elderly care, home monitoring, or entertainment. In all of these applications, VSNs monitor a potentially large group of people and record sensitive image data that might contain identities of persons, their behavior, interaction patterns, or personal preferences. These intimate details can be easily abused, for example, to derive personal profiles. The highly sensitive nature of images makes security and privacy in VSNs even more important than in most other sensor and data networks. However, the direct use of security techniques developed for related domains might be misleading due to the different requirements and design challenges. This is especially true for aspects such as data confidentiality and privacy protection against insiders, generating awareness among monitored people, and giving trustworthy feedback about recorded personal data—all of these aspects go beyond what is typically required in other applications. In this survey, we present an overview of the characteristics of VSN applications, the involved security threats and attack scenarios, and the major security challenges. A central contribution of this survey is our classification of VSN security aspects into data-centric, node-centric, network-centric, and user-centric security. We identify and discuss the individual security requirements and present a profound overview of related work for each class. We then discuss privacy protection techniques and identify recent trends in VSN security and privacy. A discussion of open research issues concludes this survey.

read more

Citations
More filters
Journal ArticleDOI

Visual privacy protection methods

TL;DR: This paper seeks to clarify how privacy can be protected in imagery data, so as a main contribution a comprehensive classification of the protection methods for visual privacy as well as an up-to-date review of them are provided.
Journal ArticleDOI

De-identification for privacy protection in multimedia content

TL;DR: The study provides an overview of de-identification approaches for non-biometric identifiers (text, hairstyle, dressing style, license plates), as well as for the physiological, behavioural and soft biometric identifiers in multimedia documents.
Journal ArticleDOI

A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification

TL;DR: In this article, the authors classify and thoroughly review the existing biometric authentication systems by focusing on the security and privacy solutions and propose a number of criteria with regard to secure and privacy-preserving authentication.
Journal ArticleDOI

Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things

TL;DR: The proposed dynamic privacy protection model is designed for ensuring mobile device user privacy even in large volume of data transmissions, which uses dynamic programming to produce an optimal solution of maximizing privacy protection levels even for resource constrained devices.
References
More filters
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Journal Article

Security for Sensor Networks

TL;DR: This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Journal ArticleDOI

A survey on wireless multimedia sensor networks

TL;DR: Existing solutions and open research issues at the application, transport, network, link, and physical layers of the communication protocol stack are investigated, along with possible cross-layer synergies and optimizations.
Journal ArticleDOI

SPINS: security protocols for sensor networks

TL;DR: A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Proceedings ArticleDOI

Timing-sync protocol for sensor networks

TL;DR: It is argued that TPSN roughly gives a 2x better performance as compared to Reference Broadcast Synchronization (RBS) and verify this by implementing RBS on motes and use simulations to verify its accuracy over large-scale networks.
Related Papers (5)