메뉴 건너뛰기




Volumn 47, Issue 1, 2014, Pages

Security and privacy protection in visual sensor networks: A survey

Author keywords

Image sensor security; Privacy protection; Visual sensor networks

Indexed keywords

DATA PRIVACY; IMAGE SENSORS; SECURITY SYSTEMS; SENSOR NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84905865401     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2545883     Document Type: Review
Times cited : (143)

References (163)
  • 1
    • 67549101202 scopus 로고    scopus 로고
    • Analysis and design of a hardware/software trusted platform module for embedded systems
    • Najwa Aaraj, Anand Raghunathan, and Niraj K. Jha. 2008. Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Transactions on Embedded Computing Systems 8, 1, 1-31.
    • (2008) ACM Transactions on Embedded Computing Systems , vol.8 , Issue.1 , pp. 1-31
    • Aaraj, N.1    Raghunathan, A.2    Jha, N.K.3
  • 4
    • 33845708421 scopus 로고    scopus 로고
    • A survey on wireless multimedia sensor networks
    • Ian F. Akyildiz, Tommaso Melodia, and Kaushik R. Chowdhury. 2007. A survey on wireless multimedia sensor networks. Computer Networks 51, 4, 921-960.
    • (2007) Computer Networks , vol.51 , Issue.4 , pp. 921-960
    • Akyildiz, I.F.1    Melodia, T.2    Chowdhury, K.R.3
  • 7
    • 84905856889 scopus 로고    scopus 로고
    • ARM Limited. 2009. ARM Security Technology: Building a Secure System Using TrustZone Technology. Technical Report
    • ARM Limited. 2009. ARM Security Technology: Building a Secure System Using TrustZone Technology. Technical Report.
  • 13
    • 77956225749 scopus 로고    scopus 로고
    • The BehaviorScope framework for enabling ambient assisted living
    • March 2010
    • Athanasios Bamis, Dimitrios Lymberopoulos, Thiago Teixeira, and Andreas Savvides. 2010. The BehaviorScope framework for enabling ambient assisted living. Personal and Ubiquitous Computing 14, 6 (March 2010), 473-487.
    • (2010) Personal and Ubiquitous Computing , vol.14 , Issue.6 , pp. 473-487
    • Bamis, A.1    Lymberopoulos, D.2    Teixeira, T.3    Savvides, A.4
  • 14
    • 0002500694 scopus 로고    scopus 로고
    • Image authentication techniques for surveillance applications
    • Franco Bartolini, Anastasios Tefas, Mauro Barni, and Ioannis Pitas. 2001. Image authentication techniques for surveillance applications. Proceedings of the IEEE 89, 10, 1403-1418.
    • (2001) Proceedings of the IEEE , vol.89 , Issue.10 , pp. 1403-1418
    • Bartolini, F.1    Tefas, A.2    Barni, M.3    Pitas, I.4
  • 15
    • 77954765209 scopus 로고    scopus 로고
    • Autonomous audio-supported learning of visual classifiers for traffic monitoring
    • Horst Bischof, Martin Godec, Christian Leistner, Bernhard Rinner, and Andreas Starzacher. 2010. Autonomous audio-supported learning of visual classifiers for traffic monitoring. IEEE Intelligent Systems 25, 3, 15-23.
    • (2010) IEEE Intelligent Systems , vol.25 , Issue.3 , pp. 15-23
    • Bischof, H.1    Godec, M.2    Leistner, C.3    Rinner, B.4    Starzacher, A.5
  • 16
    • 36849045793 scopus 로고    scopus 로고
    • Secure time synchronization protocols for wireless sensor networks
    • Azzedine Boukerche and Damla Turgut. 2007. Secure time synchronization protocols for wireless sensor networks. IEEE Wireless Communications 14, 5, 64-69.
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 64-69
    • Boukerche, A.1    Turgut, D.2
  • 21
  • 22
    • 67651030465 scopus 로고    scopus 로고
    • Efficient and provably secure aggregation of encrypted data in wireless sensor networks
    • May 2009
    • Claude Castelluccia, Aldar C-F. Chan, EinarMykletun, and Gene Tsudik. 2009. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks 5, 3 (May 2009), 1-36.
    • (2009) ACM Transactions on Sensor Networks , vol.5 , Issue.3 , pp. 1-36
    • Castelluccia, C.1    Chan, A.C.-F.2    Mykletun, E.3    Tsudik, G.4
  • 24
    • 85032751373 scopus 로고    scopus 로고
    • Privacy in video surveillance
    • March 2007
    • Andrea Cavallaro. 2007. Privacy in video surveillance. IEEE Signal Processing Magazine 24, 2 (March 2007), 168-169.
    • (2007) IEEE Signal Processing Magazine , vol.24 , Issue.2 , pp. 168-169
    • Cavallaro, A.1
  • 25
    • 84905856890 scopus 로고    scopus 로고
    • Ph.D. Dissertation. Information &Privacy Commissioner Ontario, Canada
    • Ann Cavoukian. 2013a. Privacy by Design Centre of Excellence. Ph.D. Dissertation. Information &Privacy Commissioner Ontario, Canada.
    • (2013) Privacy by Design Centre of Excellence
    • Cavoukian, A.1
  • 27
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Haowen Chan and Adrian Perrig. 2003. Security and privacy in sensor networks. IEEE Computer 36, 10, 103-105.
    • (2003) IEEE Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 32
    • 84905856892 scopus 로고    scopus 로고
    • Phoebus Wei-Chih Chen, Parvez Ahammad, Colby Boyer, Shih-I Huang, Leon Lin, Edgar J. Lobaton, Marci Lenore Meingast, Songhwai Oh, Simon Wang, Posu Yan, Allen Yang, Chuohao Yeo, Lung-Chung Chang
    • Phoebus Wei-Chih Chen, Parvez Ahammad, Colby Boyer, Shih-I Huang, Leon Lin, Edgar J. Lobaton, Marci Lenore Meingast, Songhwai Oh, Simon Wang, Posu Yan, Allen Yang, Chuohao Yeo, Lung-Chung Chang.
  • 39
    • 30344482882 scopus 로고    scopus 로고
    • INSENS: Intrusion-tolerant routing for wireless sensor networks
    • January 2006
    • Jing Deng, R. Han, and Shivakant Mishra. 2006. INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications 29, 2 (January 2006), 216-230.
    • (2006) Computer Communications , vol.29 , Issue.2 , pp. 216-230
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 52
    • 0038665379 scopus 로고    scopus 로고
    • Surveillance nation (part i
    • Dan Farmer and Charles C. Mann. 2003. Surveillance nation (part I). Technology Review 4, 34-43.
    • (2003) Technology Review , vol.4 , pp. 34-43
    • Farmer, D.1    Mann, C.C.2
  • 54
    • 55649119763 scopus 로고    scopus 로고
    • Smart camera based monitoring system and its application to assisted living
    • Sven Fleck and Wolfgang Straßer. 2008. Smart camera based monitoring system and its application to assisted living. Proceedings of the IEEE 96, 10, 1698-1714.
    • (2008) Proceedings of the IEEE , vol.96 , Issue.10 , pp. 1698-1714
    • Fleck, S.1    Straßer, W.2
  • 56
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • Gary L. Friedman. 1993. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics 39, 4, 905-910.
    • (1993) IEEE Transactions on Consumer Electronics , vol.39 , Issue.4 , pp. 905-910
    • Friedman, G.L.1
  • 63
    • 85032770601 scopus 로고    scopus 로고
    • Smart video surveillance for proactive security
    • July 2008
    • Arun Hampapur. 2008. Smart video surveillance for proactive security. IEEE Signal Processing Magazine 25, 4 (July 2008), 134-136.
    • (2008) IEEE Signal Processing Magazine , vol.25 , Issue.4 , pp. 134-136
    • Hampapur, A.1
  • 65
    • 84905856883 scopus 로고    scopus 로고
    • HART Communication Foundation. 2010. WirelessHART Security Overview. Retrieved October 2013
    • HART Communication Foundation. 2010. WirelessHART Security Overview. Retrieved October 2013 from http://www.hartcomm.org.
  • 69
    • 79954510617 scopus 로고    scopus 로고
    • Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction
    • Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei. 2011. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. In Proceedings of SPIE. 12.
    • (2011) Proceedings of SPIE , pp. 12
    • Hsu, C.-Y.1    Lu, C.-S.2    Pei, S.-C.3
  • 72
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • January 2005
    • Yih-Chun Hu, Adrian Perrig, and David B. Johnson. 2005. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11, 1-2 (January 2005), 21-38.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 73
    • 84905856884 scopus 로고    scopus 로고
    • ISA100 Wireless Compliance Institute. 2011. ISA-100.11.a Wireless Standard. Retrieved October 2013
    • ISA100 Wireless Compliance Institute. 2011. ISA-100.11.a Wireless Standard. Retrieved October 2013 from http://www.isa100wci.org.
  • 76
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1, 2-3, 293-315.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 83
    • 85032751121 scopus 로고    scopus 로고
    • Encrypted signal processing for privacy protection
    • Reginald L. Lagendijk, Zekeriya Erkin, and Mauro Barni. 2013. Encrypted signal processing for privacy protection. IEEE Signal Processing Magazine 30, 1, 82-105.
    • (2013) IEEE Signal Processing Magazine , vol.30 , Issue.1 , pp. 82-105
    • Lagendijk, R.L.1    Erkin, Z.2    Barni, M.3
  • 84
    • 77952591585 scopus 로고    scopus 로고
    • Source camera identification using enhanced sensor pattern noise
    • June 2010
    • Chang-tsun Li. 2010. Source camera identification using enhanced sensor pattern noise. IEEE Transactions on Information Forensics and Security 5, 2 (June 2010), 280-287.
    • (2010) IEEE Transactions on Information Forensics and Security , vol.5 , Issue.2 , pp. 280-287
    • Li, C.-T.1
  • 90
    • 84947943261 scopus 로고    scopus 로고
    • Protecting digital media content
    • July 1998
    • Nasir Memon and Ping Wah Wong. 1998. Protecting digital media content. Communications of the ACM 41, 7 (July 1998), 35-43.
    • (1998) Communications of the ACM , vol.41 , Issue.7 , pp. 35-43
    • Memon, N.1    Wong, P.W.2
  • 92
    • 70350619334 scopus 로고    scopus 로고
    • A secure digital camera architecture for integrated real-time digital rights management
    • October 2009
    • Saraju P. Mohanty. 2009. A secure digital camera architecture for integrated real-time digital rights management. Journal of Systems Architecture 55, 10-12 (October 2009), 468-480.
    • (2009) Journal of Systems Architecture , vol.55 , Issue.10-12 , pp. 468-480
    • Mohanty, S.P.1
  • 93
    • 70349449310 scopus 로고    scopus 로고
    • Dynamic privacy in public surveillance
    • September 2009
    • Simon Moncrieff, Svetha Venkatesh, and Geoff West. 2009. Dynamic privacy in public surveillance. IEEE Computer 42, 9 (September 2009), 22-28.
    • (2009) IEEE Computer , vol.42 , Issue.9 , pp. 22-28
    • Moncrieff, S.1    Venkatesh, S.2    West, G.3
  • 95
    • 84899611447 scopus 로고    scopus 로고
    • Technical Report. Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria
    • Steven Ney and Kurt Pichler. 2002. Video Surveillance in Austria. Technical Report. Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria.
    • (2002) Video Surveillance in Austria
    • Ney, S.1    Pichler, K.2
  • 98
    • 84905856876 scopus 로고    scopus 로고
    • OpenStreetMap.org. 2011. OpenStreetMap.org Video Surveillance Camera Overlay. Retrieved April 2011
    • OpenStreetMap.org. 2011. OpenStreetMap.org Video Surveillance Camera Overlay. Retrieved April 2011 from http://osm.vdska.de.
  • 100
    • 84905856878 scopus 로고    scopus 로고
    • CCTV Camera Positions in Paris. Retrieved March 2012
    • OWNI. 2011. CCTV Camera Positions in Paris. Retrieved March 2012 from http://app.owni.fr/camera-paris.
    • (2011)
  • 101
    • 67549118456 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: A comprehensive overview
    • August 2009
    • Suat Ozdemir and Yang Xiao. 2009. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks 53, 12 (August 2009), 2022-2037.
    • (2009) Computer Networks , vol.53 , Issue.12 , pp. 2022-2037
    • Ozdemir, S.1    Xiao, Y.2
  • 106
  • 107
    • 79960882539 scopus 로고    scopus 로고
    • Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
    • Christina Popper, Mario Strasser, and Srdjan Capkun. 2010. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications 28, 5, 1-13.
    • (2010) IEEE Journal on Selected Areas in Communications , vol.28 , Issue.5 , pp. 1-13
    • Popper, C.1    Strasser, M.2    Capkun, S.3
  • 114
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • David R. Raymond, Scott F. Midkiff, Anthony Wood, and John A. Stankovic. 2008. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing 7, 1, 74-81.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2    Wood, A.3    Stankovic, J.A.4
  • 116
    • 55549116307 scopus 로고    scopus 로고
    • A bright future for distributed smart cameras
    • October 2008
    • Bernhard Rinner and Wayne Wolf. 2008. A bright future for distributed smart cameras. Proceedings of the IEEE 96, 10 (October 2008), 1562-1564.
    • (2008) Proceedings of the IEEE , vol.96 , Issue.10 , pp. 1562-1564
    • Rinner, B.1    Wolf, W.2
  • 120
    • 84862293511 scopus 로고    scopus 로고
    • Adaptive transformation for robust privacy protection in video surveillance
    • Mukesh Saini, Pradeep K. Atrey, Sharad Mehrotra, and Mohan S. Kankanhalli. 2012. Adaptive transformation for robust privacy protection in video surveillance. Advances in Multimedia, 1-10.
    • (2012) Advances in Multimedia , pp. 1-10
    • Saini, M.1    Atrey, P.K.2    Mehrotra, S.3    Kankanhalli, M.S.4
  • 124
    • 80053251267 scopus 로고    scopus 로고
    • Towards efficient wireless video sensor networks: A survey of existing node architectures and proposal for a Flexi-WVSNP design
    • Adolph Seema and Martin Reisslein. 2011. Towards efficient wireless video sensor networks: A survey of existing node architectures and proposal for a Flexi-WVSNP design. IEEE Communications Surveys and Tutorials 13, 3, 462-486.
    • (2011) IEEE Communications Surveys and Tutorials , vol.13 , Issue.3 , pp. 462-486
    • Seema, A.1    Reisslein, M.2
  • 127
    • 55549106767 scopus 로고    scopus 로고
    • Security and privacy in distributed smart cameras
    • October 2008
    • Dimitrios N. Serpanos and Andreas Papalambrou. 2008. Security and privacy in distributed smart cameras. Proceedings of the IEEE 96, 10 (October 2008), 1678-1687.
    • (2008) Proceedings of the IEEE , vol.96 , Issue.10 , pp. 1678-1687
    • Serpanos, D.N.1    Papalambrou, A.2
  • 130
    • 84905856872 scopus 로고    scopus 로고
    • Dmitry Sklyarov. 2010. Forging Canon Original Decision Data. Retrieved April 2011
    • Dmitry Sklyarov. 2010. Forging Canon Original Decision Data. Retrieved April 2011 from http://www. elcomsoft.com/canon.html.
  • 131
    • 33749987832 scopus 로고    scopus 로고
    • Attack-resilient time synchronization for wireless sensor networks
    • January 2007
    • Hui Song, Sencun Zhu, and Guohong Cao. 2007. Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5, 1 (January 2007), 112-125.
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 112-125
    • Song, H.1    Zhu, S.2    Cao, G.3
  • 135
    • 13944269967 scopus 로고    scopus 로고
    • Clock synchronization for wireless sensor networks: A survey
    • Bharath Sundararaman, Ugo Buy, and Ajay D. Kshemkalyani. 2005. Clock synchronization for wireless sensor networks: A survey. Ad Hoc Networks 3, 4, 281-323.
    • (2005) Ad Hoc Networks , vol.3 , Issue.4 , pp. 281-323
    • Sundararaman, B.1    Buy, U.2    Kshemkalyani, A.D.3
  • 142
    • 84905856873 scopus 로고    scopus 로고
    • Trusted Computing Group. 2011. TPM Main Specification 1.2, Level 2, Revision 116. Retrieved October 2013
    • Trusted Computing Group. 2011. TPM Main Specification 1.2, Level 2, Revision 116. Retrieved October 2013 from http://www.trustedcomputinggroup.org/ resources/tpm-main-specification.
  • 148
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
    • Dirk Westhoff, Joao Girao, and Mithun Acharya. 2006. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing 5, 10, 1417-1431.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 153
    • 84861687858 scopus 로고    scopus 로고
    • User centric privacy awareness in video surveillance
    • Thomas Winkler and Bernhard Rinner. 2012. User centric privacy awareness in video surveillance. Multimedia Systems Journal 18, 2, 99-121.
    • (2012) Multimedia Systems Journal , vol.18 , Issue.2 , pp. 99-121
    • Winkler, T.1    Rinner, B.2
  • 155
    • 70349253246 scopus 로고    scopus 로고
    • Trusted computing building blocks for embedded Linux-based arm trustzone platforms
    • Johannes Winter. 2008. Trusted computing building blocks for embedded Linux-based arm trustzone platforms. In Proceedings of the Workshop on Scalable Trusted Computing. 21-30.
    • (2008) Proceedings of the Workshop on Scalable Trusted Computing , pp. 21-30
    • Winter, J.1
  • 157
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • Wenyuan Xu, Ke Ma, Wade Trappe, and Yanyong Zhang. 2006. Jamming sensor networks: Attack and defense strategies. IEEE Network 20, 3, 41-47.
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 160
  • 162
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. 2006. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2, 4, 500-528.
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 163
    • 84905856874 scopus 로고    scopus 로고
    • ZigBee Consortium Web Site. Retrieved October 2013
    • ZigBee Alliance. 2012. ZigBee Consortium Web Site. Retrieved October 2013 from http://www.zigbee.org/
    • (2012)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.