Abstract
Sensor networks are typically purpose-built, designed to support a single running application. As the demand for applications that can harness the capabilities of a sensor-rich environment increases, and the availability of sensing infrastructure put in place to monitor various quantities soars, there are clear benefits in a model where infrastructure can be shared amongst multiple applications. This model however introduces many challenges, mainly related to the management of the communication of the same application running on different network nodes, and the isolation of applications within the network.
At the same time, security concerns related to terrorism, crime, and lower-level anti-social behaviour and fraud have placed pressure on government agencies to be seen to be doing something to respond. Extensive surveillance is the easy option, as already seen in the UK with the installation of millions of CCTV cameras and a political fondness for the ”database state”[ABD+09]. The emergence of low cost pervasive sensing will present another tempting target for surveillance. While there may be legitimate reasons for situational awareness from time to time, placing all citizens “under the microscope” 24/7 has a well-known corrosive effect on society[Fun04].
Thus, the combination of dynamic requirements for privacy, and occasional surveillance results in new security challenges. In this paper, we describe the Fresnel project’s technology[ELMC10] that addresses these challenges. We tackle these by design methodologies, and integrate solutions with each sensor application, and provide a substrate that enforces appropriate levels of privacy and separation of roles and rights to data, within a virtualised sensor networked OS.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Anderson, R.J., Brown, I., Dowty, T., Inglesant, P., Heath, W., Angela Sasse, M.: Database State. Joseph Rowntree Reform Trust, York (2009)
Bentham, J.: The Panopticon Writings. Verso, London (1995)
Bennetto, J.: Big brother britain 2006: ’we are waking up to a surveillance society all around us’, November 2 (2006)
Cavoukian, A.: Privacy by Design, http://www.ipc.on.ca/images/Resources/privacybydesign.pdf
Efstratiou, C., Leontiadis, I., Mascolo, C., Crowcroft, J.: A shared sensor network infrastructure. In: Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, SenSys 2010, pp. 367–368. ACM, New York (2010)
Efstratiou, C., Leontiadis, I., Picone, M., Rachuri, K.K., Mascolo, C., Crowcroft, J.: Sense and sensibility in a pervasive world. In: Kay, J., Lukowicz, P., Tokuda, H., Olivier, P., Krüger, A. (eds.) Pervasive 2012. LNCS, vol. 7319, pp. 406–424. Springer, Heidelberg (2012)
Funder, A.: Stasiland: Stories from Behind the Berlin Wall. Granta Books (2004)
Gilbert, N. (ed.): Dilemmas of Privacy and Surveillance: Challenges of Technological Change. The Royal Academy of Engineering, London (2007)
Leontiadis, I., Efstratiou, C., Mascolo, C., Crowcroft, J.: SenShare: Transforming Sensor Networks into Multi-application Sensing Infrastructures. In: Picco, G.P., Heinzelman, W. (eds.) EWSN 2012. LNCS, vol. 7158, pp. 65–81. Springer, Heidelberg (2012)
European Parliament and Council. Directive 95/46/ec of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, November 23 (1995)
Quercia, D., Leontiadis, I., McNamara, L., Mascolo, C., Crowcroft, J.: Spotme if you can: Randomized responses for location obfuscation on mobile phones. In: ICDCS, pp. 363–372 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Crowcroft, J., Brown, I. (2012). From Panopticon to Fresnel, Dispelling a False Sense of Security. In: De Decker, B., Chadwick, D.W. (eds) Communications and Multimedia Security. CMS 2012. Lecture Notes in Computer Science, vol 7394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32805-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-32805-3_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32804-6
Online ISBN: 978-3-642-32805-3
eBook Packages: Computer ScienceComputer Science (R0)