{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T22:40:02Z","timestamp":1750804802649,"version":"3.41.0"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319663982"},{"type":"electronic","value":"9783319663999"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66399-9_18","type":"book-chapter","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T14:03:24Z","timestamp":1502460204000},"page":"324-343","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Privacy Implications of Room Climate Data"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Morgner","sequence":"first","affiliation":[]},{"given":"Christian","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Ring","sequence":"additional","affiliation":[]},{"given":"Bj\u00f6rn","family":"Eskofier","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Riess","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Armknecht","sequence":"additional","affiliation":[]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,12]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Ai, B., Fan, Z., Gao, R.X.: Occupancy estimation for smart buildings by an auto-regressive hidden Markov model. In: American Control Conference, ACC 2014, Portland, OR, USA, 4\u20136 June 2014, pp. 2234\u20132239. IEEE (2014)","DOI":"10.1109\/ACC.2014.6859372"},{"key":"18_CR2","unstructured":"BSI: Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP). https:\/\/www.commoncriteriaportal.org\/files\/ppfiles\/pp0073b_pdf.pdf. Accessed Mar 2014"},{"issue":"2","key":"18_CR3","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s12394-010-0046-y","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A., Polonetsky, J., Wolf, C.: SmartPrivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity Inf. Soc. 3(2), 275\u2013294 (2010)","journal-title":"Identity Inf. Soc."},{"key":"18_CR4","unstructured":"Chaos Computer Club: Guidelines for Smart Home Solutions, February 2016. (in German) https:\/\/www.ccc.de\/en\/updates\/2016\/smarthome"},{"key":"18_CR5","unstructured":"Deloitte: Ready for Takeoff? Consumer Survey, July 2015"},{"issue":"7","key":"18_CR6","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.enbuild.2010.01.016","volume":"42","author":"B Dong","year":"2010","unstructured":"Dong, B., Andrews, B., Lam, K.P., H\u00f6ynck, M., Zhang, R., Chiou, Y.-S., Benitez, D.: An information technology enabled sustainability test-bed (ITEST) for occupancy detection through an environmental sensing network. Energy Build. 42(7), 1038\u20131046 (2010)","journal-title":"Energy Build."},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Dunkels, A., B., Gr\u00f6nvall, B., Voigt, T.: Contiki - a lightweight and flexible operating system for tiny networked sensors. In: 29th Annual IEEE International Conference on Local Computer Networks, pp. 455\u2013462. IEEE (2004)","DOI":"10.1109\/LCN.2004.38"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Ebadat, A., Bottegal, G., Varagnolo, D., Wahlberg, B., Johansson, K.H.: Estimation of building occupancy levels through environmental signals deconvolution. In: BuildSys 2013, Proceedings of 5th ACM Workshop On Embedded Systems For Energy-Efficient Buildings, Roma, Italy, 13\u201314 November 2013, pp. 8:1\u20138:8 (2013)","DOI":"10.1145\/2528282.2528290"},{"issue":"4","key":"18_CR9","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1109\/TASE.2015.2471305","volume":"12","author":"A Ebadat","year":"2015","unstructured":"Ebadat, A., Bottegal, G., Varagnolo, D., Wahlberg, B., Johansson, K.H.: Regularized deconvolution-based approaches for estimating room occupancies. IEEE Trans. Autom. Sci. Eng. 12(4), 1157\u20131168 (2015)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"18_CR10","unstructured":"Ecobee: Privacy policy & terms of use, April 2015"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Ekwevugbe, T., Brown, N., Pakka, V., Fan, D.: Real-time building occupancy sensing using neural-network based sensor network. In: 7th IEEE International Conference on Digital Ecosystems and Technologies (DEST), pp. 114\u2013119, July 2013","DOI":"10.1109\/DEST.2013.6611339"},{"key":"18_CR12","unstructured":"European Union Agency For Network And Information Security: Security and Resilience of Smart Home Environments - Good Practices and Recommendations. https:\/\/www.enisa.europa.eu. Accessed December 2015"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4","volume-title":"Privacy Enhancing Technologies - PETS 2011","year":"2011","unstructured":"Fischer-H\u00fcbner, S., Hopper, N. (eds.): Privacy Enhancing Technologies - PETS 2011. LNCS, vol. 6794. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-22263-4"},{"key":"18_CR14","unstructured":"Greveler, U., Gl\u00f6sek\u00f6tterz, P., Justusy, B., Loehr, D.: Multimedia content identification through smart meter power usage profiles. In: Proceedings of International Conference on Information and Knowledge Engineering (IKE) (2012)"},{"key":"18_CR15","unstructured":"Hailemariam, E., Goldstein, R., Attar, R., Khan, A.: Real-time occupancy detection using decision trees with multiple sensor types. In: 2011 Spring Simulation Multi-conference, SpringSim 2011, Boston, MA, USA, 03\u201307 April 2011, pp. 141\u2013148 (2011)"},{"issue":"1","key":"18_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. Newsl. 11(1), 10\u201318 (2009)","journal-title":"SIGKDD Explor. Newsl."},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Han, Z., Gao, R.X., Fan, Z.: Occupancy and indoor environment quality sensing for smart buildings. In: 2012 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), pp. 882\u2013887, May 2012","DOI":"10.1109\/I2MTC.2012.6229557"},{"issue":"2","key":"18_CR18","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/44.31557","volume":"8","author":"GW Hart","year":"1989","unstructured":"Hart, G.W.: Residential energy monitoring and computerized surveillance via utility power flows. IEEE Technol. Soc. Mag. 8(2), 12\u201316 (1989)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"18_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.H.: The Elements of Statistical Learning, 2nd edn. Springer, New York (2009)","edition":"2"},{"key":"18_CR20","unstructured":"Honeywell: Honeywell connected home privacy statement, December 2015"},{"issue":"3","key":"18_CR21","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/JBHI.2015.2421487","volume":"20","author":"V Huppert","year":"2016","unstructured":"Huppert, V., Paulus, J., Paulsen, U., Burkart, M., Wullich, B., Eskofier, B.: Quantification of nighttime micturition with an ambulatory sensor-based system. IEEE J. Biomed. Health Inform. 20(3), 865\u2013872 (2016)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"18_CR22","unstructured":"icontrol Networks: 2015 State of the Smart Home Report. https:\/\/www.icontrol.com\/blog\/2015-state-of-the-smart-home-report"},{"key":"18_CR23","unstructured":"Intel Security: Intel Security\u2019s International Internet of Things Smart Home Survey Shows Many Respondents Sharing Personal Data for Money. https:\/\/newsroom.intel.com\/news-releases\/intel-securitys-international-internet-of-things-smart-home-survey"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-H\u00fcbner and Hopper [13], pp. 192\u2013210 (2011)","DOI":"10.1007\/978-3-642-22263-4_11"},{"key":"18_CR25","unstructured":"Jawurek, M., Kerschbaum, F., Danezis, G.: SoK: privacy technologies for smart grids - a survey of options. Microsoft Research, Cambridge, UK (2012)"},{"issue":"10","key":"18_CR26","doi-asserted-by":"publisher","first-page":"3972","DOI":"10.1109\/JSEN.2016.2530019","volume":"16","author":"U Jensen","year":"2016","unstructured":"Jensen, U., Blank, P., Kugler, P., Eskofier, B.: Unobtrusive and energy-efficient swimming exercise tracking using on-node processing. IEEE Sens. J. 16(10), 3972\u20133980 (2016)","journal-title":"IEEE Sens. J."},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-friendly aggregation for the smart-grid. In: Fischer-H\u00fcbner and Hopper [13], pp. 175\u2013191 (2011)","DOI":"10.1007\/978-3-642-22263-4_10"},{"key":"18_CR28","unstructured":"Lam, K.P., H\u00f6ynck, M., Dong, B., Andrews, B., Chiou, Y.S., Benitez, D., Choi, J.: Occupancy detection through an extensive environmental sensor network in an open-plan office building. In: Proceedings of Building Simulation 2009, an IBPSA Conference (2009)"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Lu, J., Sookoor, T., Srinivasan, V., Gao, G., Holben, B., Stankovic, J., Field, E., Whitehouse, K.: The smart thermostat: using occupancy sensors to save energy in homes. In: Proceedings of 8th ACM Conference on Embedded Networked Sensor Systems, pp. 211\u2013224. ACM (2010)","DOI":"10.1145\/1869983.1870005"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Masood, M.K., Soh, Y.C., Chang, V.W., Real-time occupancy estimation using environmental parameters. In: 2015 International Joint Conference on Neural Networks, IJCNN 2015, Killarney, Ireland, 12\u201317 July 2015, pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/IJCNN.2015.7280781"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys 2010, New York, NY, USA, pp. 61\u201366. ACM (2010)","DOI":"10.1145\/1878431.1878446"},{"key":"18_CR32","unstructured":"Moteiv Corporation: Tmote Sky Datasheet (2006)"},{"key":"18_CR33","unstructured":"Nest: Privacy statement for nest products and services, March 2016"},{"key":"18_CR34","unstructured":"R Core Team: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria (2014)"},{"key":"18_CR35","unstructured":"Rainie, L., Duggan, M.: Pew Research: Privacy and Information Sharing. http:\/\/www.pewinternet.org\/2016\/01\/14\/privacy-and-information-sharing. Accessed Jan 2016"},{"key":"18_CR36","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.pmcj.2014.10.002","volume":"16","author":"A Reinhardt","year":"2015","unstructured":"Reinhardt, A., Englert, F., Christin, D.: Averting the privacy risks of smart metering by local data preprocessing. Pervas. Mob. Comput. 16, 171\u2013183 (2015)","journal-title":"Pervas. Mob. Comput."},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2011, pp. 49\u201360. ACM, New York (2011)","DOI":"10.1145\/2046556.2046564"},{"key":"18_CR38","unstructured":"Ring, M., Jensen, U., Kugler, P., Eskofier, B.: Software-based performance and complexity analysis for the design of embedded classification systems. In: Proceedings of 21st International Conference on Pattern Recognition, ICPR 2012, Tsukuba, Japan, 11\u201315 November 2012, pp. 2266\u20132269. IEEE Computer Society (2012)"},{"key":"18_CR39","unstructured":"Selinger, M.: Test: Smart Home Kits Leave the Door Wide Open - for Everyone. https:\/\/www.av-test.org\/en\/news\/news-single-view\/test-smart-home-kits-leave-the-door-wide-open-for-everyone\/. Accessed Apr 2014"},{"issue":"2","key":"18_CR40","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s12525-015-0191-0","volume":"25","author":"S Spiekermann","year":"2015","unstructured":"Spiekermann, S., Acquisti, A., B\u00f6hme, R., Hui, K.-L.: The challenges of personal data markets and privacy. Electron. Mark. 25(2), 161\u2013167 (2015)","journal-title":"Electron. Mark."},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"van Kasteren, T., Noulas, A., Englebienne, G., Kr\u00f6se, B.: Accurate activity recognition in a home setting. In: Proceedings of 10th International Conference on Ubiquitous Computing. ACM (2008)","DOI":"10.1145\/1409635.1409637"},{"key":"18_CR42","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"IH Witten","year":"2011","unstructured":"Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Morgan Kaufmann, Burlington (2011)","edition":"3"},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"W\u00f6rner, D., von Bomhard, T., Roeschlin, M., Wortmann, F.: Look twice: uncover hidden information in room climate sensor data. In: 4th International Conference on the Internet of Things, IoT 2014, Cambridge, MA, USA, 6\u20138 October 2014, pp. 25\u201330. IEEE (2014)","DOI":"10.1109\/IOT.2014.7030110"},{"key":"18_CR44","doi-asserted-by":"crossref","unstructured":"Yang, W., Li, N., Qi, Y., Qardaji, W., McLaughlin, S., McDaniel, P.: Minimizing private data disclosures in the smart grid. In: Proceedings of 2012 ACM Conference on Computer and Communications Security, pp. 415\u2013427. ACM (2012)","DOI":"10.1145\/2382196.2382242"},{"issue":"8","key":"18_CR45","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1177\/0037549713489918","volume":"90","author":"Z Yang","year":"2014","unstructured":"Yang, Z., Li, N., Becerik-Gerber, B., Orosz, M.D.: A systematic approach to occupancy modeling in ambient sensor-rich buildings. Simulation 90(8), 960\u2013977 (2014)","journal-title":"Simulation"},{"issue":"2","key":"18_CR46","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s12273-012-0075-6","volume":"5","author":"R Zhang","year":"2012","unstructured":"Zhang, R., Lam, K.P., Chiou, Y.-S., Dong, B.: Information-theoretic environment features selection for occupancy detection in open office spaces. Build. Simul. 5(2), 179\u2013188 (2012)","journal-title":"Build. Simul."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66399-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T22:00:40Z","timestamp":1750802440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-66399-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663982","9783319663999"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66399-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"12 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/deic.uab.cat\/conferences\/dpm\/dpm2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}