Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment

被引:2
|
作者
Lee, Jaeseung [1 ]
Kang, Jungho [2 ]
Jun, Moon-seog [1 ]
Han, Jaekyung [3 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul 07027, South Korea
[2] Baewha Womens Univ, Dept Informat Secur, Seoul 03039, South Korea
[3] Kwangwoon Univ, Grad Sch Construct Legal Affairs, Dept Construct Legal Affairs, Seoul 01890, South Korea
来源
SYMMETRY-BASEL | 2019年 / 11卷 / 03期
关键词
IP camera; IP camera security; NVR security; video security;
D O I
10.3390/sym11030361
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in the sense that all things are connected to the Internet, and network attacks that have thus far been exploited in the existing PC environment are now also occurring frequently in the IoT environment. In fact, there have been many security incidents such as DDoS attacks involving the hacking of IP cameras, which are typical IoT devices, leakages of personal information and the monitoring of numerous persons without their consent. While attacks in the existing Internet environment were PC-based, we have confirmed that various smart devices used in the IoT environment-such as IP cameras and tablets-can be utilized and exploited for attacks on the network. Even though it is necessary to apply security solutions to IoT devices in order to prevent potential problems in the IoT environment, it is difficult to install and execute security solutions due to the inherent features of small devices with limited memory space and computational power in this aforementioned IoT environment, and it is also difficult to protect certificates and encryption keys due to easy physical access. Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security framework designed to prevent them. The results of the performance evaluation of this study confirm that the proposed protocol is able to cope with various security threats in the network. Furthermore, from the perspective of energy efficiency, it was also possible to confirm that the proposed protocol is superior to other cryptographic protocols. Thus, it is expected to be effective if applied to the IoT environment.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] iPRP-The Parallel Redundancy Protocol for IP Networks: Protocol Design and Operation
    Popovic, Miroslav
    Mohiuddin, Maaz
    Tomozei, Dan-Cristian
    Le Boudec, Jean-Yves
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (05) : 1842 - 1854
  • [2] An Efficient NTRU-Based Authentication Protocol in IoT Environment
    Jeong, SeongHa
    Park, KiSung
    Park, YoHan
    Park, YoungHo
    INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 1262 - 1268
  • [3] EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment
    Bahaa Hussein Taher Algubili
    Neeraj Kumar
    Hongwei Lu
    Ali A. Yassin
    Rihab Boussada
    Alzahraa J. Mohammed
    Huiyu Liu
    Peer-to-Peer Networking and Applications, 2022, 15 : 2179 - 2198
  • [4] EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment
    Algubili, Bahaa Hussein Taher
    Kumar, Neeraj
    Lu, Hongwei
    Yassin, Ali A.
    Boussada, Rihab
    Mohammed, Alzahraa J.
    Liu, Huiyu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (05) : 2179 - 2198
  • [5] On the design of efficient congestion control for the Constrained Application Protocol in IoT
    Makarem, Nabil
    Diab, Wafaa Bou
    Mougharbel, Imad
    Malouch, Naceur
    COMPUTER NETWORKS, 2022, 207
  • [6] Cryptanalysis and Countermeasure of "An Efficient NTRU-based Authentication Protocol in IoT Environment"
    Park, YoHan
    Seok, Woojin
    Lee, Wonhyuk
    Ju, Hong Taek
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (12) : 25 - 31
  • [7] Design of efficient anonymous identity authentication protocol for lightweight IoT devices
    Wang, Zhenyu
    Guo, Yang
    Li, Shaoqing
    Hou, Shen
    Deng, Ding
    Tongxin Xuebao/Journal on Communications, 2022, 43 (07): : 49 - 61
  • [8] Protocol Enhancements for Moving From Connected IoT to Efficient IoT
    Papageorgiou, Apostolos
    2015 8TH INTERNATIONAL CONFERENCE ON INTELLIGENCE IN NEXT GENERATION NETWORKS, 2015, : 58 - 63
  • [9] Efficient Design for Smart Environment Using Raspberry Pi with Blockchain and IoT (BRIoT)
    Ponugumati, Sunil K.
    Ali, Kamran
    Lasebae, Aboubaker
    Zahoor, Zaid
    Kiyani, Anum T.
    Khoshkholghi, Ali
    Latha, Maddu
    2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 75 - 80
  • [10] Use of TCP/IP protocol in industrial environment
    Muskinja, N
    Tovornik, B
    Terbuc, M
    2003 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2003, : 896 - 900