Abstract
Recently, a wide range of smart devices are deployed in a variety of environments to improve the quality of human life. One of the important IoT-based applications is smart homes for healthcare, especially for elders. IoT-based smart homes enable elders’ health to be properly monitored and taken care of. However, elders’ privacy might be disclosed from smart homes due to non-fully protected network communication or other reasons. To demonstrate how serious this issue is, we introduce in this paper a Privacy Mining Approach (PMA) to mine privacy from smart homes by conducting a series of deductions and analyses on sensor datasets generated by smart homes. The experimental results demonstrate that PMA is able to deduce a global sensor topology for a smart home and disclose elders’ privacy in terms of their house layouts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431–440 (2015)
Analysis: 24 Billion IoT Devices on earth by 2020. https://www.technocracy.news/8069/
Cook, D.J., Das, S.K.: Smart Environments: Technology, Protocols and Applications, vol. 43. Wiley (2004)
Lundström, J., Järpe, E., Verikas, A.: Detecting and exploring deviating behaviour of smart home residents. Expert Syst. Appl. 55, 429–440 (2016)
Rashidi, P., Cook, D.J., Holder, L.B., Schmitter-Edgecombe, M.: Discovering activities to recognize and track in a smart environment. IEEE Trans. Knowl. Data Eng. 23(4), 527–539 (2011)
Lu, L., Cai, Q. -L., Zhan, Y. -J.: Activity recognition in smart homes. Multimedia Tools Appl., 1–18 (2016)
Park, H., Basaran, C., Park, T., Son, S.H.: Energy-efficient privacy protection for smart home environments using behavioral semantics. Sensors 14(9), 16235–16257 (2014)
Kumarage, H., Khalil, I., Alabdulatif, A., Tari, Z., Yi, X.: Secure data analytics for cloud-integrated internet of things applications. IEEE Cloud Comput. 3(2), 46–56 (2016)
Sajid, A., Abbas, H., Saleem, K.: Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4, 1375–1384 (2016)
Trappe, W., Howard, R., Moore, R.S.: Low-energy security: limits and opportunities in the Internet of Things. IEEE Secur. Priv. 13(1), 14–21 (2015)
Ali, A.M.M., Ahmad, N.M., Amin, A.H.M.: Cloudlet-based cyber foraging framework for distributed video surveillance provisioning. In: 2014 Fourth World Congress on Information and Communication Technologies (WICT), pp. 199–204. IEEE, December 2014
Chae, H., Park, J., Song, H., Kim, Y., Jeong, H.: The IoT based automate landing system of a drone for the round-the-clock surveillance solution. In: 2015 IEEE International Conference on Advanced Intelligent Mechatronics (AIM) IEEE, pp. 1575–1580, July 2015
Liu, Z., Yan. T.: Study on multi-view video based on IOT and its application in intelligent security system. In: Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), pp. 1437–1440. IEEE, December 2013
Taneja, M.: A framework to support real-time applications over ieee802.15.4 DSME. In: 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1–6. IEEE, April 2015
Rashidi, P., Cook, D.J.: COM: a method for mining and monitoring human activity patterns in home-based health monitoring system. ACM Trans. Intell. Syst. Technol. 4(4), 64 (2013)
Schurgot, M.R., Shinberg, D.A., Greenwald, L.G.: Experiments with security and privacy in IoT networks. In: 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6 (2015)
Yoshigoe, K., Dai, W., Abramson, M., Jacobs, A.: Overcoming invasion of privacy in smart home environment with synthetic packet injection. In: TRON Symposium (TRONSHOW), pp. 1–7. IEEE (2015)
Hacking the Z-Wave protocol with a HackRF. http://www.rtl-sdr.com/hacking-the-z-wave-protocol-with-a-hackrf/
Z-Wave Sniffer. http://www.suphammer.net/zwave_sniffer
Lai, K., Narciso, C.: Support vs. confidence in association rule algorithms. In: Proceedings of the OPTIMA Conference, Curicó (2001)
Chen, L., Hoey, J., Nugent, C.D., Cook, D.J., Yu, Z.: Sensor-based activity recognition. IEEE Trans. Syst. Man and Cybern. Part C (Appl. Rev.) 42(6), 790–808 (2012)
Krishnan, N.C., Cook, D.J.: Activity recognition on streaming sensor data. Pervasive Mob. Comput. 10, 138–154 (2014)
Lukowicz, P., Ward, J., Junker, H., Stäger, M., Tröster, G., Atrash, A., Starner, T.: Recognizing workshop activity using body worn microphones and accelerometers. In Proceedings of the Second International Conference on Pervasive Computing (Pervasive), Vienna, Austria, pp. 18–32, April 2004
Lester, J., Choudhury, T., Kern, N., Borriello, G., Hannaford, B.: A hybrid discriminative/generative approach for modeling human activities. In: Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence (IJCAI). July–August 2005, Edinburgh, Scotland, pp. 766–772
Maurer, U., Smailagic, A., Siewiorek, D.P., Deisher, M.: Activity recognition and monitoring using multiple sensors on different body positions. In: International Workshop on Wearable and Implantable Body Sensor Networks, pp. 113–116. IEEE, April 2006
Zhao, L., Wang, X., Sukthankar, G., Sukthankar, R.: Motif discovery and feature selection for CRF-based activity recognition. In: 20th International Conference on Pattern Recognition (ICPR), pp. 3826–3829. IEEE, August 2010
Inomata, T., Naya, F., Kuwahara, N., Hattori, F., Kogure, K.: Activity recognition from interactions with objects using dynamic Bayesian network. In: Proceedings of the 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems, pp. 39–42. ACM, May 2009
Gu, T., Wu, Z., Tao, X., Pung, H.K., Lu, J.: epSICAR: an emerging patterns based approach to sequential, interleaved and concurrent activity recognition. In: IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, pp. 1–9. IEEE, March 2009
Gu, T., Chen, S., Tao, X., Lu, J.: An unsupervised approach to activity recognition and segmentation based on object-use fingerprints. Data Knowl. Eng. 69(6), 533–544 (2010)
Rashidi, P., Cook, D.J.: Mining sensor streams for discovering human activity patterns over time. In: 2010 IEEE 10th International Conference on Data Mining (ICDM), pp. 431–440. IEEE, December 2010
WSU CASAS Datasets. http://ailab.wsu.edu/casas/datasets.html
Cook, D., Schmitter-Edgecombe, M.: Assessing the quality of activities in a smart environment. Methods Inf. Med. 48(5), 480–485 (2009)
Srinivasan, V., Stankovic J., Whitehouse K.: Protecting your daily in-home activity information from a wireless snooping attack. In Proceedings of the 10th International Conference on Ubiquitous Computing, pp. 202–211. ACM (2008)
Acknowledgments
This work is supported by the project IoTSec – Security in IoT for Smart Grids, with number 248113/O70 part of the IKTPLUSS program funded by the Norwegian Research Council. This work is also partially supported by SIRIUS, which is a Norwegian Centre for Research-driven Innovation in Norway. The authors would like to thank the anonymous reviewers for their valuable comments and suggestions that improve the paper quality.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Lee, MC., Lin, JC., Owe, O. (2019). Privacy Mining from IoT-Based Smart Homes. In: Barolli, L., Leu, FY., Enokido, T., Chen, HC. (eds) Advances on Broadband and Wireless Computing, Communication and Applications. BWCCA 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-030-02613-4_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-02613-4_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02612-7
Online ISBN: 978-3-030-02613-4
eBook Packages: EngineeringEngineering (R0)