skip to main content
10.1145/2659021.2669476acmconferencesArticle/Chapter ViewAbstractPublication PagesicdscConference Proceedingsconference-collections
tutorial

Demo: TrustEYE.M4 -- A novel Platform for Secure Visual Sensor Network Applications

Published: 04 November 2014 Publication History

Abstract

Designers of Visual Sensor Network (VSN) platforms face many challenges. Image sensors deliver large amounts of data and substantial computing power and memory are required for processing. At the same time power consumption should be kept low to facilitate battery-powered operation. The increasing deployment of VSNs also raises privacy and security related questions. In this work we present a new VSN platform called TrustEYE.M4 which is designed as a state-of-the-art research platform for the development of secure VSN applications. It integrates an ARM Cortex M4 processor, a WiFi radio, a high-performance image sensor and a dedicated security chip. We present the architecture of TrustEYE.M4 and demonstrate its capabilities with a secure video streaming application.

References

[1]
M. Brezovan and C. Badica. A Review on Vision Surveillance Techniques in Smart Home Environments. In Proceedings of the International Conference on Control Systems and Computer Science, pages 471--478, 2013.
[2]
A. Cavoukian. Surveillance, Then and now: Securing Privacy in Public Spaces. Technical report, 2013.
[3]
A. Chattopadhyay and T. E. Boult. PrivacyCam: A Privacy Preserving Camera Using uClinux on the Blackfin DSP. In Proceedings of the International Conference on Computer Vision and Pattern Recognition, pages 1--8, 2007.
[4]
P. W.-C. Chen, P. Ahammad, C. Boyer, S.-I. Huang, L. Lin, E. J. Lobaton, M. L. Meingast, S. Oh, S. Wang, P. Yan, A. Yang, C. Yeo, L.-C. Chang, D. Tygar, and S. S. Sastry. CITRIC: A Low-Bandwidth Wireless Camera Network Platform. In Proceedings of the International Conference on Distributed Smart Cameras, page 10, 2008.
[5]
S. Fleck and W. Straßer. Smart Camera Based Monitoring System and its Application to Assisted Living. Proceedings of the IEEE, 96(10):1698--1714, 2008.
[6]
S. P. Mohanty. A Secure Digital Camera Architecture for Integrated Real-Time Digital Rights Management. Journal of Systems Architecture, 55(10-12):468--480, Oct. 2009.
[7]
M. Rahimi, R. Baer, O. I. Iroezi, J. C. Garcia, J. Warrior, D. Estrin, and M. B. Srivastava. Cyclops: In Situ Image Sensing and Interpretation in Wireless Sensor Networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems, page 13, 2005.
[8]
Trusted Computing Group. TPM Main Specification 1.2, Level 2, Revision 116. http://www.trustedcomputinggroup.org/resources/tpm\_main\_specification, July 2011. last visited: July 2014.
[9]
T. Winkler, A. Erdélyi, and B. Rinner. TrustEYE.M4: Protecting the Sensor - not the Camera. In Proceedings of the International Conference on Advanced Video and Signal Based Surveillance, page 6, 2014. (to appear).
[10]
T. Winkler and B. Rinner. Securing Embedded Smart Cameras with Trusted Computing. EURASIP Journal on Wireless Communications and Networking, 2011:20, 2011.
[11]
T. Winkler and B. Rinner. Security and Privacy Protection in Visual Sensor Networks: A Survey. ACM Computing Surveys, 47(1):42, 2014. (in print).

Cited By

View all
  • (2024)NIR-sighted: A Programmable Streaming Architecture for Low-Energy Human-Centric Vision ApplicationsACM Transactions on Embedded Computing Systems10.1145/367207623:6(1-26)Online publication date: 11-Sep-2024
  • (2019)Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT ApplicationsSensors10.3390/s1902032719:2(327)Online publication date: 15-Jan-2019
  • (2017)Smart cameras with onboard signcryption for securing IoT applications2017 Global Internet of Things Summit (GIoTS)10.1109/GIOTS.2017.8016279(1-6)Online publication date: Jun-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICDSC '14: Proceedings of the International Conference on Distributed Smart Cameras
November 2014
286 pages
ISBN:9781450329255
DOI:10.1145/2659021
  • General Chair:
  • Andrea Prati,
  • Publications Chair:
  • Niki Martinel
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Embedded smart cameras
  2. Privacy
  3. Security
  4. Visual sensors

Qualifiers

  • Tutorial
  • Research
  • Refereed limited

Conference

ICDSC '14
Sponsor:

Acceptance Rates

ICDSC '14 Paper Acceptance Rate 49 of 69 submissions, 71%;
Overall Acceptance Rate 92 of 117 submissions, 79%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)NIR-sighted: A Programmable Streaming Architecture for Low-Energy Human-Centric Vision ApplicationsACM Transactions on Embedded Computing Systems10.1145/367207623:6(1-26)Online publication date: 11-Sep-2024
  • (2019)Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT ApplicationsSensors10.3390/s1902032719:2(327)Online publication date: 15-Jan-2019
  • (2017)Smart cameras with onboard signcryption for securing IoT applications2017 Global Internet of Things Summit (GIoTS)10.1109/GIOTS.2017.8016279(1-6)Online publication date: Jun-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media