Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security and privacy protection in visual sensor networks: a survey
Winkler T., Rinner B. ACM Computing Surveys47 (1):1-42,2014.Type:Article
Date Reviewed: Sep 30 2014

Visual sensor networks (VSNs) consist of devices with image sensors and with processing and networking capabilities, to monitor large quantities of images of people, automobiles, and so on. VSNs amplify the core nature of the surveillance society with widespread application areas such as environmental monitoring, smart homes and meeting rooms, elder care, and assisted living. The network of cameras can collect data that can be analyzed to identify the identities, behaviors, interaction patterns, and personal preferences of individuals. A proper set of security and privacy mechanisms should be understood and implemented for the VSNs.

The authors use a holistic approach by categorizing the security requirements and related studies by each component in the VSN, namely, node-centric security, data-centric security, network-centric security, as well as user-centric security. Data-centric security requirements include nonrepudiation and confidentiality, thus protection approaches address data confidentiality, integrity, authenticity, as well as correct timestamping and location requirements. The data-level approaches also address privacy and access authorization to meet the confidentiality requirements. The node-centric security approaches address availability, physical security, and code security requirements. The network-centric security approaches try to address channel security with the network data confidentiality, integrity, availability, and freshness security requirements, as well as the collaboration security requirements to prevent routing attacks, time synchronization attacks, data sharing, and aggregation attacks. The user-centric security approaches handle issues such as user awareness and consent when the user is monitored and his or her data is shared, and feedback and control mechanisms to allow the end users to have a way to provide feedback on the usage or control of their own data.

The authors have analyzed and categorized a vast number of publications on VSN security and privacy requirements, issues, and approaches using this holistic approach. This can be a useful resource for academics and students, as well as industry professionals to gain knowledge on the security requirements specific to each component of a VSN and its related security and privacy protection approaches.

Reviewer:  Soon Ae Chun Review #: CR142774 (1504-0321)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
Public Policy Issues (K.4.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy