Browse > Article
http://dx.doi.org/10.5762/KAIS.2020.21.10.602

Authentication and Key Management Techniques for Secure Communication in IP Camera  

Min, So-Yeon (Dept. of Information and Communication Engineering, Seoil University)
Lee, Jae-Seung (Dept. of Computer Science and Engineering, Soongsil University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.21, no.10, 2020 , pp. 602-608 More about this Journal
Abstract
Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.
Keywords
IoT Authentication; IoT Security; IP Camera Security; Key management; Home Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 TEKEOGLU, Ali; TOSUN, Ali Saman. Investigating security and privacy of a cloud-based wireless IP camera: NetCam. In: 2015 24th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2015. pp. 1-6. DOI : https://doi.org/10.1109/icccn.2015.7288421
2 SINGH, Sneha, et al. IP camera video surveillance using Raspberry Pi. International Journal of Advanced Research in Computer and Communication Engineering, 2015, 4.2: 326-328. DOI : https://doi.org/10.17148/ijarcce.2015.4272   DOI
3 SUMAN, M. Chaitanya; PRATHYUSHA, K. Wireless camera based online examination security. International Journal of Engineering Research and Applications (IJERA) Vol, 2012, 2: 1432-1435.
4 KAPUR, Shyam. Systems and methods for search query processing using trend analysis. U.S. Patent No 7,562,076, 2009.
5 POPOVIC, Gradimirka, et al. Overview, characteristics and advantages of IP Camera video surveillance systems compared to systems with other kinds of camera. Int. J. Eng. Sci. Innov. Technol, 2013, 2.5: 356-362.
6 FRUSTACI, Mario, et al. Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of things journal, 2017, 5.4: 2483-2495. DOI : https://doi.org/10.1109/jiot.2017.2767291   DOI
7 HWA, Kuo Yuan, et al. A GHS-based intelligent management platform with IP-camera security system. Wireless Personal Communications, 2011, 56.1: 85-96. DOI : https://doi.org/10.1007/s11277-009-9877-y   DOI
8 SERALATHAN, Yogeesh, et al. IoT security vulnerability: A case study of a Web camera. In: 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE, 2018. pp. 172-177. DOI : https://doi.org/10.23919/icact.2018.8323686