Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment

被引:2
|
作者
Lee, Jaeseung [1 ]
Kang, Jungho [2 ]
Jun, Moon-seog [1 ]
Han, Jaekyung [3 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul 07027, South Korea
[2] Baewha Womens Univ, Dept Informat Secur, Seoul 03039, South Korea
[3] Kwangwoon Univ, Grad Sch Construct Legal Affairs, Dept Construct Legal Affairs, Seoul 01890, South Korea
来源
SYMMETRY-BASEL | 2019年 / 11卷 / 03期
关键词
IP camera; IP camera security; NVR security; video security;
D O I
10.3390/sym11030361
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in the sense that all things are connected to the Internet, and network attacks that have thus far been exploited in the existing PC environment are now also occurring frequently in the IoT environment. In fact, there have been many security incidents such as DDoS attacks involving the hacking of IP cameras, which are typical IoT devices, leakages of personal information and the monitoring of numerous persons without their consent. While attacks in the existing Internet environment were PC-based, we have confirmed that various smart devices used in the IoT environment-such as IP cameras and tablets-can be utilized and exploited for attacks on the network. Even though it is necessary to apply security solutions to IoT devices in order to prevent potential problems in the IoT environment, it is difficult to install and execute security solutions due to the inherent features of small devices with limited memory space and computational power in this aforementioned IoT environment, and it is also difficult to protect certificates and encryption keys due to easy physical access. Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security framework designed to prevent them. The results of the performance evaluation of this study confirm that the proposed protocol is able to cope with various security threats in the network. Furthermore, from the perspective of energy efficiency, it was also possible to confirm that the proposed protocol is superior to other cryptographic protocols. Thus, it is expected to be effective if applied to the IoT environment.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Reliable and efficient multicast protocol for mobile IP networks
    Yoo, Sang-Jo
    Cho, Hyung-Sang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2008, 21 (07) : 731 - 753
  • [32] An Efficient Key Management and Authentication Protocol for IoT Networks
    Reddy, Alumuru Mahesh
    Rao, M. Kameswara
    PRZEGLAD ELEKTROTECHNICZNY, 2023, 99 (10): : 153 - 159
  • [33] Energy Efficient Routing Protocol for IOT Based Application
    Dhtore, Virendrakumar A.
    Verma, Avnish Raj
    Thigale, Somnath B.
    TECHNO-SOCIETAL 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SOCIETAL APPLICATIONS - VOL 1, 2020, : 197 - 204
  • [34] Cogent and Energy Efficient Authentication Protocol for WSN in IoT
    Butt, Tariq Mahmood
    Riaz, Rabia
    Chakraborty, Chinmay
    Rizvi, Sanam Shahla
    Paul, Anand
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 1877 - 1898
  • [35] Energy Efficient Clustering and Optimized LOADng Protocol for IoT
    Sharma, Divya
    Jain, Sanjay
    Maik, Vivek
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (01): : 357 - 370
  • [36] Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices
    Wang, Zhenyu
    Deng, Ding
    Hou, Shen
    Guo, Yang
    Li, Shaoqing
    COMPUTER COMMUNICATIONS, 2023, 203 : 1 - 14
  • [37] Design of secure AES encrypted IP cores for IoT environments
    Song, Kunming
    Zhang, Caizhen
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1417 - 1423
  • [38] Design of an Energy Efficient IoT enabled Smart System based on DALI network over MQTT protocol
    Sinha, Aniruddha
    Sharma, Shubham
    Goswami, Puja
    Verma, Vivek Kumar
    Manas, Munish
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [39] Environment-Aware Dense Video Captioning for IoT-Enabled Edge Cameras
    Lu, Ching-Hu
    Fan, Gang-Yuan
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (06) : 4554 - 4564
  • [40] Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment
    Paris, Iqbal Luqman Bin Mohd
    Habaebi, Mohamed Hadi
    Zyoud, Alhareth Mohammed
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (01) : 163 - 182