Skip to main content

Privacy Mining from IoT-Based Smart Homes

  • Conference paper
  • First Online:
Advances on Broadband and Wireless Computing, Communication and Applications (BWCCA 2018)

Abstract

Recently, a wide range of smart devices are deployed in a variety of environments to improve the quality of human life. One of the important IoT-based applications is smart homes for healthcare, especially for elders. IoT-based smart homes enable elders’ health to be properly monitored and taken care of. However, elders’ privacy might be disclosed from smart homes due to non-fully protected network communication or other reasons. To demonstrate how serious this issue is, we introduce in this paper a Privacy Mining Approach (PMA) to mine privacy from smart homes by conducting a series of deductions and analyses on sensor datasets generated by smart homes. The experimental results demonstrate that PMA is able to deduce a global sensor topology for a smart home and disclose elders’ privacy in terms of their house layouts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431–440 (2015)

    Article  Google Scholar 

  2. Analysis: 24 Billion IoT Devices on earth by 2020. https://www.technocracy.news/8069/

  3. Cook, D.J., Das, S.K.: Smart Environments: Technology, Protocols and Applications, vol. 43. Wiley (2004)

    Google Scholar 

  4. Lundström, J., Järpe, E., Verikas, A.: Detecting and exploring deviating behaviour of smart home residents. Expert Syst. Appl. 55, 429–440 (2016)

    Article  Google Scholar 

  5. Rashidi, P., Cook, D.J., Holder, L.B., Schmitter-Edgecombe, M.: Discovering activities to recognize and track in a smart environment. IEEE Trans. Knowl. Data Eng. 23(4), 527–539 (2011)

    Article  Google Scholar 

  6. Lu, L., Cai, Q. -L., Zhan, Y. -J.: Activity recognition in smart homes. Multimedia Tools Appl., 1–18 (2016)

    Google Scholar 

  7. Park, H., Basaran, C., Park, T., Son, S.H.: Energy-efficient privacy protection for smart home environments using behavioral semantics. Sensors 14(9), 16235–16257 (2014)

    Article  Google Scholar 

  8. Kumarage, H., Khalil, I., Alabdulatif, A., Tari, Z., Yi, X.: Secure data analytics for cloud-integrated internet of things applications. IEEE Cloud Comput. 3(2), 46–56 (2016)

    Article  Google Scholar 

  9. Sajid, A., Abbas, H., Saleem, K.: Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4, 1375–1384 (2016)

    Article  Google Scholar 

  10. Trappe, W., Howard, R., Moore, R.S.: Low-energy security: limits and opportunities in the Internet of Things. IEEE Secur. Priv. 13(1), 14–21 (2015)

    Article  Google Scholar 

  11. Ali, A.M.M., Ahmad, N.M., Amin, A.H.M.: Cloudlet-based cyber foraging framework for distributed video surveillance provisioning. In: 2014 Fourth World Congress on Information and Communication Technologies (WICT), pp. 199–204. IEEE, December 2014

    Google Scholar 

  12. Chae, H., Park, J., Song, H., Kim, Y., Jeong, H.: The IoT based automate landing system of a drone for the round-the-clock surveillance solution. In: 2015 IEEE International Conference on Advanced Intelligent Mechatronics (AIM) IEEE, pp. 1575–1580, July 2015

    Google Scholar 

  13. Liu, Z., Yan. T.: Study on multi-view video based on IOT and its application in intelligent security system. In: Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), pp. 1437–1440. IEEE, December 2013

    Google Scholar 

  14. Taneja, M.: A framework to support real-time applications over ieee802.15.4 DSME. In: 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1–6. IEEE, April 2015

    Google Scholar 

  15. Rashidi, P., Cook, D.J.: COM: a method for mining and monitoring human activity patterns in home-based health monitoring system. ACM Trans. Intell. Syst. Technol. 4(4), 64 (2013)

    Article  Google Scholar 

  16. Schurgot, M.R., Shinberg, D.A., Greenwald, L.G.: Experiments with security and privacy in IoT networks. In: 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6 (2015)

    Google Scholar 

  17. Yoshigoe, K., Dai, W., Abramson, M., Jacobs, A.: Overcoming invasion of privacy in smart home environment with synthetic packet injection. In: TRON Symposium (TRONSHOW), pp. 1–7. IEEE (2015)

    Google Scholar 

  18. Hacking the Z-Wave protocol with a HackRF. http://www.rtl-sdr.com/hacking-the-z-wave-protocol-with-a-hackrf/

  19. Z-Wave Sniffer. http://www.suphammer.net/zwave_sniffer

  20. Lai, K., Narciso, C.: Support vs. confidence in association rule algorithms. In: Proceedings of the OPTIMA Conference, Curicó (2001)

    Google Scholar 

  21. Chen, L., Hoey, J., Nugent, C.D., Cook, D.J., Yu, Z.: Sensor-based activity recognition. IEEE Trans. Syst. Man and Cybern. Part C (Appl. Rev.) 42(6), 790–808 (2012)

    Google Scholar 

  22. Krishnan, N.C., Cook, D.J.: Activity recognition on streaming sensor data. Pervasive Mob. Comput. 10, 138–154 (2014)

    Article  Google Scholar 

  23. Lukowicz, P., Ward, J., Junker, H., Stäger, M., Tröster, G., Atrash, A., Starner, T.: Recognizing workshop activity using body worn microphones and accelerometers. In Proceedings of the Second International Conference on Pervasive Computing (Pervasive), Vienna, Austria, pp. 18–32, April 2004

    Google Scholar 

  24. Lester, J., Choudhury, T., Kern, N., Borriello, G., Hannaford, B.: A hybrid discriminative/generative approach for modeling human activities. In: Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence (IJCAI). July–August 2005, Edinburgh, Scotland, pp. 766–772

    Google Scholar 

  25. Maurer, U., Smailagic, A., Siewiorek, D.P., Deisher, M.: Activity recognition and monitoring using multiple sensors on different body positions. In: International Workshop on Wearable and Implantable Body Sensor Networks, pp. 113–116. IEEE, April 2006

    Google Scholar 

  26. Zhao, L., Wang, X., Sukthankar, G., Sukthankar, R.: Motif discovery and feature selection for CRF-based activity recognition. In: 20th International Conference on Pattern Recognition (ICPR), pp. 3826–3829. IEEE, August 2010

    Google Scholar 

  27. Inomata, T., Naya, F., Kuwahara, N., Hattori, F., Kogure, K.: Activity recognition from interactions with objects using dynamic Bayesian network. In: Proceedings of the 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems, pp. 39–42. ACM, May 2009

    Google Scholar 

  28. Gu, T., Wu, Z., Tao, X., Pung, H.K., Lu, J.: epSICAR: an emerging patterns based approach to sequential, interleaved and concurrent activity recognition. In: IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, pp. 1–9. IEEE, March 2009

    Google Scholar 

  29. Gu, T., Chen, S., Tao, X., Lu, J.: An unsupervised approach to activity recognition and segmentation based on object-use fingerprints. Data Knowl. Eng. 69(6), 533–544 (2010)

    Article  Google Scholar 

  30. Rashidi, P., Cook, D.J.: Mining sensor streams for discovering human activity patterns over time. In: 2010 IEEE 10th International Conference on Data Mining (ICDM), pp. 431–440. IEEE, December 2010

    Google Scholar 

  31. WSU CASAS Datasets. http://ailab.wsu.edu/casas/datasets.html

  32. Cook, D., Schmitter-Edgecombe, M.: Assessing the quality of activities in a smart environment. Methods Inf. Med. 48(5), 480–485 (2009)

    Article  Google Scholar 

  33. Srinivasan, V., Stankovic J., Whitehouse K.: Protecting your daily in-home activity information from a wireless snooping attack. In Proceedings of the 10th International Conference on Ubiquitous Computing, pp. 202–211. ACM (2008)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the project IoTSec – Security in IoT for Smart Grids, with number 248113/O70 part of the IKTPLUSS program funded by the Norwegian Research Council. This work is also partially supported by SIRIUS, which is a Norwegian Centre for Research-driven Innovation in Norway. The authors would like to thank the anonymous reviewers for their valuable comments and suggestions that improve the paper quality.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ming-Chang Lee , Jia-Chun Lin or Olaf Owe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lee, MC., Lin, JC., Owe, O. (2019). Privacy Mining from IoT-Based Smart Homes. In: Barolli, L., Leu, FY., Enokido, T., Chen, HC. (eds) Advances on Broadband and Wireless Computing, Communication and Applications. BWCCA 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-030-02613-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02613-4_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02612-7

  • Online ISBN: 978-3-030-02613-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics