Exploiting Security Issues in Human Activity Recognition Systems (HARSs)
Abstract
:1. Introduction
2. Related Works
Year | Research | Privacy Issue | Countermeasures |
---|---|---|---|
2023 | [16,48,49] | Information leakage during the learning procedure and personalization of the HARS | Differential privacy and secure multi-party computation |
2022 | [50,51] | Information leakage during the learning procedure | Optimized prediction algorithm for privacy-preserving activity recognition based on deep neural networks, and WiFi state information |
2021 | [30,52,53] | Information leakage during the learning procedure | Hierarchical labeling/machine-generated human activity hierarchy |
2021 | [31,54,55] | The devices’ limitations and communication channels | Smartphone-based end-to-end framework and RFID-based authentication |
2020 | [56,57] | Private information leakage (public dataset privacy and training data privacy) | Homomorphic encryption and cloud computing |
2019 | [20,21] | Information leakage during the learning procedure | Analyze attacker’s queries and defense against attacks |
2019 | [14] | Information leakage from databases | Differential privacy |
2018 | [58] | Information leakage during the learning procedure | Analyze ML algorithms’ vulnerabilities and defense against attacks |
2017 | [59] | Information leakage during the learning procedure | Differential privacy |
3. Human Activity Recognition System
4. Security and Privacy Issues in HARSs
4.1. Security and Privacy Considerations
4.2. Vulnerabilities in Each HARS Layer
- The application layer: The application layer is the user’s main interface with the application and, thus, the network. This layer is an attractive attack target because the data reside within the application. Some of the main attacks that can occur in this layer are clock desynchronization attacks, malicious code injection, and eavesdropping attacks.
- The transport layer: The TCP transport protocol (transmission control protocol) aims to reliably send and receive data and transfer them without errors between the network and application layers. However, TCP is vulnerable to attacks that could degrade network performance. The most basic attacks against network performance are SYN Flood, ACK message flooding, and hijacking.
- The data link layer: The data link layer is defined by protocols regulating data transmission between entities and aimed at reliable communication. The data frames, headers, and queues help in error detection. Then, the errors are corrected, or retransmission of the data is requested. When securing communication between parties against unauthorized access, it would be prudent to use encryption protocols. Sniffing and MAC spoofing (media access control) are common data link layer attacks.
- The network layer: the Internet protocol (IP) defines forwarding and addressing. Therefore, deals with the network’s topology and the participating entities’ identity. A problem that could create a security gap is that the communicating entities do not know the path the data follow or whether malicious entities are monitoring them. For this reason, attacks such as IP spoofing, PingFlood, ARP spoofing (MitM), sinkhole, wormhole, and sybil attacks could occur [73,74,75].
- Data collecting mechanism and remote databases: Because our application handles sensitive data, it is crucial to secure the processing, storage, and transmission procedures. Data integrity and confidentiality between parties are essential for the security of the above processes. However, these properties are shaken when the system faces denial of service (DoS) attacks, man-in-the-middle (MitM) attacks, and cryptanalysis attacks.
5. Technical Details
- Initially, in step 1 there is key generation. Unlike the public key, the private key is never transferred between entities. We should store the specific key in each entity and ensure its security.
- Step 2 involves creating a certification that validates the authenticity and integrity of entities within the system. This certification serves as a digital signature, providing assurance of the entity’s identity and ensuring secure communication.
- In step 3, the auth server certificate registration takes place, and the data collection mechanism sends registration information to the authserver. This registration process verifies the server’s authenticity and establishes it as a trusted authentication and access control authority.
- In step 4, the registration information is sent to the authserver by the data collecting mechanism. This information enables the auth server to identify and authenticate the data collection mechanism.
- Step 5 involves registering the data collection mechanism by the authserver. Once registered, the authserver assigns a unique ID to the data collection mechanism, establishing a recognized identity for future interactions.
- Step 6 establishes a secure communication channel between the data collection mechanism and the auth server using mutual transport layer security (TLS). Both entities present their X.509 certifications and public keys, ensuring the integrity and confidentiality of their communications.
- The data collection mechanism requests an access token from the auth server in step 7. This token is proof of authentication and authorization to access protected resources within the system.
- The auth server generates the access token in step 7, including the hashed certification presented by the data collection mechanism. In step 8, this token combines the authentication information and integrates it with the data collection mechanism’s certification hash.
- Step 9 involves the registration of the data collection mechanism’s certification within the system. This registration process validates the authenticity and integrity of the data collection mechanism.
- Step 10 establishes a secure communication channel between the data collection mechanism and the ML (machine service) using mutual TLS. The data collection mechanism presents its certification and public key, while the ML service presents its X.509 certification and public key.
- The data collection mechanism presents the access token from the auth server in step 11. This token serves as proof of authentication and authorization for accessing protected resources.
- In step 12, the ML service communicates with the auth server to verify the certification hash presented by the data collection mechanism. This verification ensures the integrity and authenticity of the data collection mechanism.
- Step 13 involves the retrieval of token information by the ML service. This information is necessary to determine the authentication and authorization status of the data collection mechanism.
- Finally, in step 14, the ML service returns the requested information, such as the recognized activity, to the data collection mechanism. This retrieval is only allowed if the hash of the certification within the access token aligns with the hash presented during the mutual TLS process, ensuring the integrity and authenticity of the data.
5.1. Key Generation
5.2. Certificate Generation
- They create a certificate signing request (CSR). The CSR contains the entity’s (patient and caregiver) public key and some data collecting mechanism’s identity information, such as name, organization, and email.
- They sign the CSR with their private key and send it to the CA.
- The CA will verify them by sending the CSR.
- The CA then uses the public key in the certificate to verify their signature, ensuring that the data collecting mechanism owns the private key paired with the certificate’s public key.
- If everything is valid, the CA will sign the certificate with its private key and send it to the data collecting mechanism.
5.3. Data Collecting Mechanism’s Registration in the Authserver
5.4. Authentication through the TLS 1.3 Protocol
5.5. The Data Collecting Mechanism/Authserver Configuration
- Encrypted extensions: The authserver must send this message immediately after the ServerHello message. This is the first message that is encrypted with the handshake_traffic_key from server_handshake_traffic_secret. The client should check the message for unacceptable extensions, if there are any, the handshake should be aborted.
- Certificate request: Asking for the client’s certificate for authentication so that the requirement for mutual authentication is satisfied.
- CA: Declaring the CA it trusts and accepts certificates from. It essentially indicates the DNs of the CAs.
- Signature algorithms: This indicates which signing algorithms can be used in CertificateVerify messages.
5.6. The Update of the Authentication Certificate
- Certificate: for authentication
- CertificateVerify: for key verification
- Finished: for the integrity of the handshake process
- First, it checks the validity period of the authserver certificate. If the current date and time are outside the specified range, the server certificate has expired. Therefore, the authentication process does not continue.
- Then, the data collecting mechanism validates the authserver’s certificate with the CA that issued it. The data collecting mechanism also has the DN of the trusted CA stored and checks the DN of the certificate sent by the authserver, and if the two DNs match, it will continue the authentication process. As we have mentioned, the certification of the authserver is signed with the private key of the CA that the data collecting mechanism trusts. The data collecting mechanism owns the CA’s public key so that they can verify the signature. If the content of the certificate has changed since the CA signed it, or if the CA certificate’s public key does not match the private key used by the CA to sign the authserver’s certificate, the authserver’s authentication will fail. If the CA’s digital signature can be verified, the data collecting mechanism can confirm that the authserver’s certificate is valid.
- Then, it verifies the certificate’s signature and the message using the authserver’s public key (known by the certificate). The data collecting mechanism using the certificate and the certificate verification message can authenticate the identity of the authserver.
- Finally, the data collecting mechanism checks the finished message, and the MAC of the entire handshake using server_handshake_traffic_secret to ensure it has not been compromised. More specifically, it will try to check the verified data value sent in the finished message.
5.7. Issuance of Access Tokens to Data Collecting Mechanism
- $
- curl—request POST \
- -
- cacert AMServer.cer \
- -
- data “client_id = myClient” \
- -
- data “grant_type = client_credentials” \
- -
- data “scope = write” \
- -
- data “response_type = token” \
- -
- cert myClientCertificate.pem \
- -
- key myClientCertificate.key.pem \
- {
- “access_token”:f08f1fcf-3ecb-4120-820d-fb71e3f51c04”,
- “refresh_token”:”IwOGYzYTImM2YxOTQ5MGE3YmNmMDFkNTVk”
- “scope”:”profile”
- “token_type”:”Bearer”,
- “expires_in”:3599
- }
5.8. Refresh Tokens
- The client requests a new access token from the authorization server by presenting the refresh token.
- After authenticating the client and validating the renewal token, the authorization server issues a new access token (and, optionally, a new renewal token).
- The client is being authenticated to the authorization server using certificates.
- Following a specific authorization flow, the client requests an access token (only the client_id is used).
- The authorization server returns the access token to the client with the client’s certificate hash embedded. As our implementation stores the various elements of the access token in the server’s database, an identifier will be returned to the client identifying the set of contents of the access token.
5.9. Data Collecting Mechanism Access Request in ML Service’s Protected Information
5.10. ML Service–Authserver Communication for Access Token Confirmation
6. OAuth2.0 Infrastructure
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
- The handshakesecret key that was generated during the handshake key generation.
- The hash value SHA256 of every handshake message from hello to serverfinished.
- -
- empty_hash = SHA256(“”)
- -
- derived_secret = HKDF-Expand-Label(key = handshake_secret, label = “derived”, context = empty_hash, len = 32)
- -
- master_secret = HKDF-Extract(salt = derived_secret, key = 00…)
- -
- client_application_traffic_secret = HKDF-Expand-Label(key = master_secret, label = “c ap traffic”, context = handshake_hash, len = 32)
- -
- server_application_traffic_secret = HKDF-Expand-Label(key = master_secret, label = “s ap traffic”, context = handshake_hash, len = 32)
- -
- client_application_key = HKDF-Expand-Label(key = client_application_traffic_secret, label = “key”, context = “”, len = 16)
- -
- server_application_key = HKDF-Expand-Label(key = server_application_traffic_secret, label = “key”, context = “”, len = 16)
- -
- client_application_iv = HKDF-Expand-Label(key = client_application_traffic_secret, label = “iv”, context = “”, len = 12)
- -
- server_application_iv = HKDF-Expand-Label(key = server_application_traffic_secret, label = “iv”, context = “”, len = 12)
Appendix B
- Key parameters: For example, the method of Diffie–Hellman key exchange.
- The cipher suites that support: i.e., TLS_AES_128_GCM_SHA256.
- The TLS edition: i.e., 1.3.
- Client random data: The client provides 32 bytes of random data, which will be used later in the session.
- The client’s public key (known from the ClientHello message).
- The server’s private key (generated in the server exchange key generation message).
- The hash value SHA256 of the ClientHello and ServerHello messages.
- -
- early_secret= HKDF-Extract(salt = 00, key = 00…)
- -
- empty_hash= SHA256(“”)
- -
- derived_secret= HKDF-Expand-Label(key = early_secret, label = “derived”, context = empty_hash, len = 32)
- -
- handshake_secret= HKDF-Extract(salt = derived_secret, key = shared_secret)
- -
- client_handshake_traffic_secret= HKDF-Expand-Label(key = handshake_secret, label = “c hs traffic”, context = hello_hash, len = 32)
- -
- server_handshake_traffic_secret= HKDF-Expand-Label(key = handshake_secret, label = “s hs traffic”, context = hello_hash, len = 32)
- -
- client_handshake_key = HKDF-Expand-Label(key = client_handshake_traffic_secret, label = “key”, context = “”, len = 16)
- -
- server_handshake_key = HKDF-Expand-Label(key = server_handshake_traffic_secret, label = “key”, context = “”, len = 16)
- -
- client_handshake_iv= HKDF-Expand-Label(key = client_handshake_traffic_secret, label = “iv”, context = “”, len = 12)
- -
- server_handshake_iv = HKDF-Expand-Label(key = server_handshake_traffic_secret, label = “iv”, context = “”, len = 12)
Appendix C
- We combine the content of the handshake and the certificate of the authserver into a value;
- We apply a hash function;
- We sign the hash value with the private key of the authserver using one of the signature algorithms supported by the data collecting mechanism.
- The resulting value from the handshake’s encrypted (e.g., SHA256) content up to that moment.
- The resulting key after inputting the server_handshake_traffic_secret value in an HKDF function.
- The resulting value and key are entered into an HMAC algorithm.
References
- Gupta, N.; Gupta, S.K.; Pathak, R.K.; Jain, V.; Rashidi, P.; Suri, J.S. Human activity recognition in artificial intelligence framework: A narrative review. Sensor-based Vision-based Radio frequency-based identification Device-free Imaging Deep learning Machine learning and hybrid models Abbreviations *CIT Citations AAL Ambient assistive living ADL Activity of daily living. Artif. Intell. Rev. 2022, 55, 4755–4808. [Google Scholar] [CrossRef]
- Gheid, Z.; Challal, Y. Novel Efficient and Privacy-Preserving Protocols for Sensor-Based Human Activity Recognition. In Proceedings of the 13th International Conference on Ubiquitous Intelligence and Computing (UIC 2016), Toulouse, France, 18–21 July 2016; p. ffhal-01312964. [Google Scholar]
- Haris, M.; Kong, H. Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics. 2023. Available online: https://www.google.com/glass/start/ (accessed on 20 January 2023).
- Selmic, R.R.; Phoha, V.V.; Serwadda, A. Wireless Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar] [CrossRef]
- Mo, J.; Shen, W.; Pan, W. An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems. Wirel. Commun. Mob. Comput. 2020, 2020, 1–13. [Google Scholar] [CrossRef]
- Liu, Q. Privacy Protection Technology Based on Machine Learning and Intelligent Data Recognition. Secur. Commun. Netw. 2022, 2022, 1–9. [Google Scholar] [CrossRef]
- Liu, X.; Xie, L.; Wang, Y.; Zou, J.; Xiong, J.; Ying, Z.; Vasilakos, A.V. Privacy and Security Issues in Deep Learning: A Survey. IEEE Access 2020, 9, 4566–4593. [Google Scholar] [CrossRef]
- El-Bakkouri, N.; Mazri, T. Security Threats in Smart Healthcare. ISPRS Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci. 2020, XLIV-4/W3-2020, 209–214. [Google Scholar] [CrossRef]
- Iwasawa, Y.; Nakayama, K.; Yairi, I.; Matsuo, Y. Privacy Issues Regarding the Application of DNNs to Activity-Recognition using Wearables and Its Countermeasures by Use of Adversarial Training. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI-17), Melbourne, Australia, 19–25 August 2017; pp. 1930–1936. [Google Scholar] [CrossRef]
- Garcia, F.D.; Jacobs, B. Privacy-friendly energy-metering via homomorphic encryption. In Security and Trust Management; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2011; pp. 226–238. [Google Scholar] [CrossRef]
- Pulido-Gaytan, L.B.; Tchernykh, A.; Cortés-Mendoza, J.M.; Babenko, M.; Radchenko, G. A Survey on Privacy-Preserving Machine Learning with Fully Homomorphic Encryption. Commun. Comput. Inf. Sci. 2021, 1327, 115–129. [Google Scholar] [CrossRef]
- Gomathisankaran, M.; Yuan, X.; Kamongi, P. Ensure privacy and security in the process of medical image analysis. In Proceedings of the 2013 IEEE International Conference on Granular Computing, GrC, Beijing, China, 13–15 December 2013; pp. 120–125. [Google Scholar] [CrossRef]
- Dai, J.; Saghafi, B.; Wu, J.; Konrad, J.; Ishwar, P. Towards privacy-preserving recognition of human. In Proceedings of the International Conference on Image Processing, ICIP, Quebec City, QC, Canada, 27–30 September 2015; pp. 4238–4242. [Google Scholar] [CrossRef]
- Liu, F. Generalized Gaussian Mechanism for Differential Privacy. IEEE Trans. Knowl. Data Eng. 2018, 31, 747–756. [Google Scholar] [CrossRef]
- Osia, S.A.; Taheri, A.; Shamsabadi, A.S.; Katevas, K.; Haddadi, H.; Rabiee, H.R.R. Deep Private-Feature Extraction. IEEE Trans. Knowl. Data Eng. 2018, 32, 54–66. [Google Scholar] [CrossRef]
- Phan, N.; Wang, Y.; Wu, X.; Dou, D. Differential Privacy Preservation for Deep Auto-Encoders: An Application of Human Behavior Prediction. In Proceedings of the 30th AAAI Conference on Artificial Intelligence, AAAI 2016, Phoenix, AZ, USA, 12–17 February 2016. [Google Scholar] [CrossRef]
- Ziller, A.; Usynin, D.; Braren, R.; Makowski, M.; Rueckert, D.; Kaissis, G. Medical imaging deep learning with differential privacy. Sci. Rep. 2021, 11, 1–8. [Google Scholar] [CrossRef]
- Tramèr, F.; Zhang, F.; Juels, A.; Reiter, M.K.; Ristenpart, T. Stealing machine learning models via prediction APIs. In Proceedings of the 25th USENIX Security Symposium, Austin, TX, USA, 10–12 August 2016. [Google Scholar]
- Wang, J.; Chen, Y.; Hao, S.; Peng, X.; Hu, L. Deep learning for sensor-based activity recognition: A survey. Pattern Recognit. Lett. 2019, 119, 3–11. [Google Scholar] [CrossRef]
- Juuti, M.; Szyller, S.; Marchal, S.; Asokan, N. PRADA: Protecting against DNN Model Stealing Attacks. In Proceedings of the 4th IEEE European Symposium on Security and Privacy, EURO S and P, Stockholm, Sweden, 17–19 June 2019; pp. 512–527. [Google Scholar] [CrossRef]
- Kariyappa, S.; Qureshi, M.K. Defending against Model Stealing Attacks with Adaptive Misinformation. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 13–19 June 2020; pp. 767–775. [Google Scholar] [CrossRef]
- Jung, I.Y. A review of privacy-preserving human and human activity recognition. Int. J. Smart Sens. Intell. Syst. 2020, 13, 1–13. [Google Scholar] [CrossRef]
- Jiang, Q.; Ma, J.; Yang, C.; Ma, X.; Shen, J.; Chaudhry, S.A. Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 2017, 63, 182–195. [Google Scholar] [CrossRef]
- Hernández-Álvarez, L.; Pérez, J.J.B.; Batista, F.K.; Queiruga-Dios, A. Security Threats and Cryptographic Protocols for Medical Wearables. Mathematics 2022, 10, 886. [Google Scholar] [CrossRef]
- Ching, K.W.; Singh, M.M. Wearable Technology Devices Security and Privacy Vulnerability Analysis. Int. J. Netw. Secur. Its Appl. 2016, 8, 19–30. [Google Scholar] [CrossRef]
- Sankar, R.; Le, X.; Lee, S.; Wang, D. Protection of data confidentiality and patient privacy in medical sensor networks. In Implantable Sensor Systems for Medical Applications; Woodhead Publishing: Sawston, UK, 2013; pp. 279–298. [Google Scholar] [CrossRef]
- Stuart, E.; Moh, M.; Moh, T.-S. Privacy and security in biomedical applications of wireless sensor networks. In Proceedings of the 1st International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL, Aalborg, Denmark, 25–28 October 2008; pp. 1–5. [Google Scholar] [CrossRef]
- Shen, Y.; Pearson, S. Privacy Enhancing Technologies: A Review; HP Laboratories Technical Report; Hewlett-Packard Development Company, L.P.: Spring, TX, USA, 2011. [Google Scholar]
- Chun, S.-H. Privacy Enhancing Technologies (PETs) and Investment Strategies for a Data Market. Procedia Soc. Behav. Sci. 2015, 185, 271–275. [Google Scholar] [CrossRef]
- Cha, S.-C.; Hsu, T.-Y.; Xiang, Y.; Yeh, K.-H. Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges. IEEE Internet Things J. 2018, 6, 2159–2187. [Google Scholar] [CrossRef]
- Majeed, A.; Bhana, R.; Ul, A.; Kyaruzi, I.; Pervaz, S.; Williams, M.-L. Internet of Everything (Ioe): Analysing the Individual Concerns Over Privacy Enhancing Technologies (Pets). Int. J. Adv. Comput. Sci. Appl. 2016, 7, 15–22. [Google Scholar] [CrossRef]
- Safa, N.S.; Mitchell, F.; Maple, C.; Azad, M.A.; Dabbagh, M. Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities. Trans. Emerg. Telecommun. Technol. 2020, 33, e4173. [Google Scholar] [CrossRef]
- De Fuentes, J.M.; Gonzalez-Manzano, L.; Solanas, A.; Veseli, F. Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities. Computer 2018, 51, 44–53. [Google Scholar] [CrossRef]
- Yan, X.; Yuan, X.; Zhang, Q.; Tang, Y. Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment. IEEE Access 2020, 8, 38285–38295. [Google Scholar] [CrossRef]
- Wang, S.; Jia, S.; Zhang, Y. Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage. IEEE Access 2019, 7, 50136–50147. [Google Scholar] [CrossRef]
- Regueiro, C.; Seco, I.; de Diego, S.; Lage, O.; Etxebarria, L. Privacy-enhancing distributed protocol for data aggregation based on blockchain and homomorphic encryption. Inf. Process. Manag. 2021, 58, 102745. [Google Scholar] [CrossRef]
- Wang, Q.; Qin, S. A Hyperledger Fabric-Based System Framework for Healthcare Data Management. Appl. Sci. 2021, 11, 11693. [Google Scholar] [CrossRef]
- Javed, I.T.; Alharbi, F.; Margaria, T.; Crespi, N.; Qureshi, K.N. PETchain: A Blockchain-Based Privacy Enhancing Technology. IEEE Access 2021, 9, 41129–41143. [Google Scholar] [CrossRef]
- Yang, X.; Li, T.; Xi, W.; Chen, A.; Wang, C. A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud. IEEE Access 2020, 8, 170713–170731. [Google Scholar] [CrossRef]
- Guo, L.; Yang, X.; Yau, W.-C. TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain. IEEE Access 2021, 9, 8479–8490. [Google Scholar] [CrossRef]
- Guo, R.; Shi, H.; Zhao, Q.; Zheng, D. Secure Attribute-Based Signature Scheme with Multiple Authorities for Blockchain in Electronic Health Records Systems. IEEE Access 2018, 6, 11676–11686. [Google Scholar] [CrossRef]
- Ding, S.; Cao, J.; Li, C.; Fan, K.; Li, H. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 2019, 7, 38431–38441. [Google Scholar] [CrossRef]
- Zuo, Y.; Kang, Z.; Xu, J.; Chen, Z. BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. Int. J. Distrib. Sens. Netw. 2021, 17, 1550147721999616. [Google Scholar] [CrossRef]
- Palas, J.U.; Bunduchi, R. Exploring interpretations of blockchain’s value in healthcare: A multi-stakeholder approach. Inf. Technol. People 2020, 34, 453–495. [Google Scholar] [CrossRef]
- Idrees, S.M.; Nowostawski, M.; Jameel, R.; Mourya, A.K. Security Aspects of Blockchain Technology Intended for Industrial Applications. Electronics 2021, 10, 951. [Google Scholar] [CrossRef]
- Moreno, R.T.; Rodriguez, J.G.; Lopez, C.T.; Bernabe, J.B.; Skarmeta, A. OLYMPUS: A distributed privacy-preserving identity management system. In Proceedings of the GIoTS 2020—Global Internet of Things Summit, Dublin, Ireland, 3 June 2020. [Google Scholar] [CrossRef]
- Bernabe, J.B.; García-Rodríguez, J.; Krenn, S.; Liagkou, V.; Skarmeta, A.; Torres, R. Privacy-Preserving Identity Management and Applications to Academic Degree Verification. IFIP Adv. Inf. Commun. Technol. 2022, 644, 33–46. [Google Scholar] [CrossRef]
- Melanson, D.; Maia, R.; Kim, H.-S.; Nascimento, A.; De Cock, M. Secure Multi-Party Computation for Personalized Human Activity Recognition. Neural Process. Lett. 2023, 2023, 1–27. [Google Scholar] [CrossRef]
- Yadav, S.K.; Sai, S.; Gundewar, A.; Rathore, H.; Tiwari, K.; Pandey, H.M.; Mathur, M. CSITime: Privacy-preserving human activity recognition using WiFi channel state information. Neural Netw. 2021, 146, 11–21. [Google Scholar] [CrossRef] [PubMed]
- Kumar, K.V.; Harikiran, J. Privacy preserving human activity recognition framework using an optimized prediction algorithm. IAES Int. J. Artif. Intell. 2022, 11, 254. [Google Scholar] [CrossRef]
- Kumar, K.V.; Harikiran, J.; Chandana, B.S. Human Activity Recognition with Privacy Preserving using Deep Learning Algorithms. In Proceedings of the 2nd International Conference on Artificial Intelligence and Signal Processing, AISP, Vijayawada, India, 12–14 February 2022; pp. 1–8. [Google Scholar] [CrossRef]
- Altin, M.; Gursoy, F.; Xu, L. Machine-Generated Hierarchical Structure of Human Activities to Reveal How Machines Think. IEEE Access 2021, 9, 18307–18317. [Google Scholar] [CrossRef]
- Ahmed, M.I.; Kannan, G. Secure and lightweight privacy preserving Internet of things integration for remote patient monitoring. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 6895–6908. [Google Scholar] [CrossRef]
- Javed, A.R.; Sarwar, M.U.; Rehman, S.U.; Khan, H.U.; Al-Otaibi, Y.D.; Alnumay, W.S. PP-SPA: Privacy Preserved Smartphone-Based Personal Assistant to Improve Routine Life Functioning of Cognitive Impaired Individuals. Neural Process. Lett. 2021, 55, 35–52. [Google Scholar] [CrossRef]
- Zhang, L.; Cui, W.; Li, B.; Chen, Z.; Wu, M.; Gee, T.S. Privacy-Preserving Cross-Environment Human Activity Recognition. IEEE Trans. Cybern. 2021, 53, 1765–1775. [Google Scholar] [CrossRef]
- Bian, S.; Wang, T.; Hiromoto, M.; Shi, Y.; Sato, T. ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 13–19 June 2020. [Google Scholar] [CrossRef]
- Rajput, A.S.; Raman, B.; Imran, J. Privacy-preserving human action recognition as a remote cloud service using RGB-D sensors and deep CNN. Expert Syst. Appl. 2020, 152, 113349. [Google Scholar] [CrossRef]
- Wang, B.; Gong, N.Z. Stealing Hyperparameters in Machine Learning. In Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 21–23 May 2018. [Google Scholar] [CrossRef]
- Papernot, N.; Abadi, M.; Brain, G.; Goodfellow, I.; Talwar, K. Semi-Supervised Knowledge Transfer for Deep Learning from Private Training Data. arXiv 2016, arXiv:1610.05755. [Google Scholar]
- Dang, L.M.; Min, K.; Wang, H.; Piran, J.; Lee, C.H.; Moon, H. Sensor-based and vision-based human activity recognition: A comprehensive survey. Pattern Recognit. 2020, 108, 107561. [Google Scholar] [CrossRef]
- Dang, L.M.; Hassan, S.I.; Im, S.; Moon, H. Face image manipulation detection based on a convolutional neural network. Expert Syst. Appl. 2019, 129, 156–168. [Google Scholar] [CrossRef]
- Maglogiannis, I.; Kazatzopoulos, L.; Delakouridis, K.; Hadjiefthymiades, S. Enabling Location Privacy and Medical Data Encryption in Patient Telemonitoring Systems. IEEE Trans. Inf. Technol. Biomed. 2009, 13, 946–954. [Google Scholar] [CrossRef] [PubMed]
- Herath, S.; Harandi, M.; Porikli, F. Going deeper into action recognition: A survey. Image Vis. Comput. 2017, 60, 4–21. [Google Scholar] [CrossRef]
- Abdallah, Z.S.; Gaber, M.M.; Srinivasan, B.; Krishnaswamy, S. Activity Recognition with Evolving Data Streams. ACM Comput. Surv. 2018, 51, 1–36. [Google Scholar] [CrossRef]
- Botilias, G.; Papoutsis, A.; Karvelis, P.; Stylios, C. Track My Health: An IoT Approach for Data Acquisition and Activity Recognition. Stud. Health Technol. Inform. 2020, 273, 266–271. [Google Scholar] [CrossRef]
- Botilias, G.-P.; Pappa, L.; Karvelis, P.; Stylios, C. Tracking individuals’ health using mobile applications and Machine Learning. In Proceedings of the 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, SEEDA-CECNSM, Ioannina, Greece, 23–25 September 2022. [Google Scholar] [CrossRef]
- Cheema, H. Human Action Recognition in Time Series Data Using Deep Learning. Available online: https://hacheemaster.github.io/HumanActivityRecognition/# (accessed on 22 May 2023).
- Papoutsis, A.; Botilias, G.; Karvelis, P.; Stylios, C. A Machine Learning Approach for Human Activity Recognition. Stud. Health Technol. Inform. 2020, 273, 155–160. [Google Scholar] [CrossRef]
- Yang, J.; Zou, H.; Xie, L. SecureSense: Defending Adversarial Attack for Secure Device-Free Human Activity Recognition. arXiv 2022, arXiv:2204.01560. [Google Scholar]
- Alqassem, I.; Svetinovic, D. A taxonomy of security and privacy requirements for the Internet of Things (IoT). In Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, Singapore, 6–9 December 2015; pp. 1244–1248. [Google Scholar] [CrossRef]
- Sinha, P.; Jha, V.K.; Rai, A.K.; Bhushan, B. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In Proceedings of the 2017 International Conference on Signal Processing and Communication (ICSPC), Coimbatore, India, 28–29 July 2017. [Google Scholar] [CrossRef]
- Vikhyath, K.B.; Brahmanand, S.H. Wireless sensor networks security issues and challenges: A survey. Int. J. Eng. Technol. 2018, 7, 89–94. [Google Scholar] [CrossRef]
- Ekong, V.; Ekong, U. A Survey of Security Vulnerabilities in Wireless Sensor Networks. Niger. J. Technol. 2016, 35, 392. [Google Scholar] [CrossRef]
- Kaschel, H.; Mardones, J.; Quezada, G. Safety in Wireless Sensor Networks: Types of Attacks and Solutions. Stud. Inform. Control 2013, 22, 323–329. [Google Scholar] [CrossRef]
- Fatema, N.; Brad, R. Attacks and Counterattacks on Wireless Sensor Networks. Int. J. Ad Hoc Sens. Ubiquitous Comput. 2013, 4, 1–15. [Google Scholar] [CrossRef]
- Hardt, D. The OAuth 2.0 Authorization Framework; RFC Editor: Phoenix, AZ, USA, 2012. [Google Scholar] [CrossRef]
- Nyström, M.; Kaliski, B. PKCS #10: Certification Request Syntax Specification, Version 1.7; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2000. [Google Scholar] [CrossRef]
- Cooper, D.; Santesson, S.; Farrell, S.; Boeyen, S.; Housley, R.; Polk, W. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile; Network Working Group Std.: Washington, DC, USA, 2008. [Google Scholar] [CrossRef]
- Campbell, B.; Bradley, J.; Sakimura, N.; Lodderstedt, T. OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2020. [Google Scholar] [CrossRef]
- Dowling, B.; Fischlin, M.; Günther, F.; Stebila, D. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. J. Cryptol. 2021, 34, 1–69. [Google Scholar] [CrossRef]
- Diffie, W.; Hellman, M. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef]
- Langley, A.; Hamburg, M.; Turner, S. Elliptic Curves for Security; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2016. [Google Scholar] [CrossRef]
- Boneh, D. LNCS 2729—Advances in Cryptology—CRYPTO 2003; Springer: Berlin/Heidelberg, Germany, 2003. [Google Scholar]
- Conrad, E.; Misenar, S.; Feldman, J. CISSP Study Guide; Syngress: Boston, MA, USA, 2010. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sakka, S.; Liagkou, V.; Stylios, C. Exploiting Security Issues in Human Activity Recognition Systems (HARSs). Information 2023, 14, 315. https://doi.org/10.3390/info14060315
Sakka S, Liagkou V, Stylios C. Exploiting Security Issues in Human Activity Recognition Systems (HARSs). Information. 2023; 14(6):315. https://doi.org/10.3390/info14060315
Chicago/Turabian StyleSakka, Sofia, Vasiliki Liagkou, and Chrysostomos Stylios. 2023. "Exploiting Security Issues in Human Activity Recognition Systems (HARSs)" Information 14, no. 6: 315. https://doi.org/10.3390/info14060315
APA StyleSakka, S., Liagkou, V., & Stylios, C. (2023). Exploiting Security Issues in Human Activity Recognition Systems (HARSs). Information, 14(6), 315. https://doi.org/10.3390/info14060315