User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes
نویسندگان
چکیده
منابع مشابه
User Perceptions of Privacy in Smart Homes
Despite the increasing presence of Internet of Things (IoT) devices inside the home, we know little about how users feel about their privacy living with Internet-connected devices that continuously monitor and collect data in their homes. To gain insight into this state of affairs, we conducted eleven semi-structured interviews with owners of smart homes, investigating privacy values and expect...
متن کاملContext-Dependent User Modelling for Smart Homes
This works presents a user modelling service for a Smart Home – intelligent context-aware environment, providing personalized proactive support to its inhabitants. Diversity of Smart Home applications imposes various technical and implementation requirements, such as the need to model dependency of user preferences on context in a unified and convenient way, both for users and for application d...
متن کاملA Smart Camera for Traffic Surveillance
The integration of advanced CMOS image sensors with high-performance processors into an embedded system facilitates new application classes such as smart cameras. A smart camera combines video sensing, video processing and communication within a single device. This paper reports on the prototype implementation of a smart camera for traffic surveillance. It captures a video stream, computes traf...
متن کاملIntegrated Wireless Technologies for Smart Homes Applications
Due to the rapid advances in wireless communication and information technologies it is now possible to embed various levels of smartness in the home. These smart homes are ones that can interact intelligently with their inhibitors to provide comfort and safe living. This interaction may range from simple control of ambient temperature to context-aware and mobile agent based services. An example...
متن کاملUser Attitudes Toward the Inspection of Encrypted Traffic
This paper reports the results of a survey of 1,976 individuals regarding their opinions on TLS inspection, a controversial technique that can be used for both benevolent and malicious purposes. Responses indicate that participants hold nuanced opinions on security and privacy trade-offs, with most recognizing legitimate uses for the practice, but also concerned about threats from hackers or go...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2018
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2018/3980371