Architecture for security monitoring in IoT environments

被引:0
|
作者
Stergiou, Christos [1 ]
Psannis, Kostas E. [1 ]
Plageras, Andreas P. [1 ]
Kokkonis, Giorgos [1 ]
Ishibashi, Yutaka [2 ]
机构
[1] Univ Macedonia, Dept Appl Informat, Thessaloniki, Greece
[2] Dept Sci & Engn Simulat Nagoya, Nagoya, Aichi, Japan
关键词
Internet of Things; Video Surveillance; IoT; monitoring; network topology; architecture;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The focus of this paper is to propose an integration between Internet of Things (IoT) and Video Surveillance, with the aim to satisfy the requirements of the future needs of Video Surveillance, and to accomplish a better use. IoT is a new technology in the sector of telecommunications. It is a network that contains physical objects, items, and devices, which are embedded with sensors and software, thus enabling the objects, and allowing for their data exchange. Video Surveillance systems collect and exchange the data which has been recorded by sensors and cameras and send it through the network. This paper proposes an innovative topology paradigm which could offer a better use of IoT technology in Video Surveillance systems. Furthermore, the contribution of these technologies provided by Internet of Things features in dealing with the basic types of Video Surveillance technology with the aim to improve their use and to have a better transmission of video data through the network. Additionally, there is a comparison between our proposed topology and relevant proposed topologies focusing on the security issue.
引用
收藏
页码:1382 / 1385
页数:4
相关论文
共 50 条
  • [1] PROPOSED ACCESS CONTROL AND SECURITY ARCHITECTURE BASED ON FOG COMPUTING FOR IOT ENVIRONMENTS
    Bharathi, C. R.
    Ramesh, L. V.
    Priya, L. Vamsi
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 1398 - 1404
  • [2] Security Challenges and Limitations in IoT Environments
    Al-Sharekh, Suha Ibrahim
    Al-Shqeerat, Khalil H. A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 193 - 199
  • [3] Security Implementation for Authentication in IoT Environments
    Rattanalerdnusorn, Ekkachan
    Thaenkaew, Phithak
    Vorakulpipat, Chalee
    [J]. 2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 678 - 681
  • [4] The IoT in Security Architecture, Challenges, and Solutions
    Punia, Anita
    Tiwari, Manish
    Verma, Sourabh Singh
    [J]. OPTICAL AND WIRELESS TECHNOLOGIES, OWT 2021, 2023, 892 : 405 - 416
  • [5] Holistic Security Architecture for IoT Technologies
    Mbanaso, U. M.
    Chukwudebe, G. A.
    Adebisi, B.
    [J]. 2017 13TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2017,
  • [6] Enhancing the security of the IoT LoraWAN architecture
    Naoui, Sarra
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    [J]. 5TH IFIP INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS PEMWN 16, 2016,
  • [7] Security Analysis of an IoT Architecture for Healthcare
    Teresa Villalba, M.
    de Buenaga, Manuel
    Gachet, Diego
    Aparicio, Fernando
    [J]. INTERNET OF THINGS: IOT INFRASTRUCTURES, PT I, 2016, 169 : 454 - 460
  • [8] New Security Architecture for IoT Network
    Flauzac, Olivier
    Gonzalez, Carlos
    Nolot, Florent
    [J]. 6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 1028 - 1033
  • [9] Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments
    Iqbal, Zahid
    [J]. SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 17 - 24
  • [10] Blockchain and Security in the IoT Environments: Literature Review
    Arslan, Halil
    Aslan, Hilal
    Karki, H. Dogan
    Yuksel, A. Gurkan
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 254 - 257