DOI QR코드

DOI QR Code

IP camera security: "Security Eyes"

  • Alshamrani, Sultan S (Department of information technology, college of computer science and information technology)
  • Received : 2022.02.05
  • Published : 2022.02.28

Abstract

With the rapid growth of Internet of Things (IoT) applications and devices, there are still defects in safety and privacy. Current researches indicate that there are weak security mechanisms to protect these devices. Humans use the Internet of Things to control and connect their devices with the Internet. Using the Internet of things has been increased over time. Therefore, capture of sensitive user data has increased intentionally or not [1]. The IP Camera is a type of (IOT) devices. Therefore, in this paper we aim to create a "Security Eyes" application that protects IP Cameras from security attacks according to certain security mechanisms (increasing the strength of encryption and filling the usual security holes in IP cameras … etc) and alerts the user when the live broadcast is interrupted or an error occurs.

Keywords

References

  1. P. A., Abdalla & C.,Varol (2020, June). "Testing IoT Security: The Case Study of an IP Camera." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-5). IEEE.
  2. Z. Ling, K. Liu, Y. Xu, Y. Jin, & X. Fu., (2017, December). "An end-to-end view of iot security and privacy." In GLOBECOM 2017-2017 IEEE Global Communications Conference (pp. 1-7). IEEE.
  3. L. Atzori, A. Iera & G. Morabito (2010)." The internet of things: A survey. "Computer networks, 54(15), 2787-2805. https://doi.org/10.1016/j.comnet.2010.05.010
  4. J. Gubbi, R. Buyya, S. Marusic, & M. Palaniswami, (2013). "Internet of Things (IoT): A vision, architectural elements, and future directions." Future generation computer systems, 29(7), 1645-1660. https://doi.org/10.1016/j.future.2013.01.010
  5. S. Hilton, (October 2016) , Dyn analysis summary of friday october 21 attack [online] Available: http://dyn.comlblog/dyn-analysis-summary-of-friday-october-21-attack/
  6. M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J.A Halderman, L. Invernizzi, M. Kallitsis, et al. "Understanding the mirai botnet." In Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, 16-18 August 2017.
  7. R. Chirgwin, Get pwned: Web cctv cams can be hijacked by single http request - server buffer overflow equals remote control, November 2016, [online] Available: http://www.theregister.co.uk/2016/11/30/iot_cameras_compromised_by_long_url.
  8. August (2019) ,"Information and Security White Paper 2019 (in Japanese)", white paper Information-technology Promotion Agency.
  9. S. Shin, & Y. Seto, (2020, June). "Development of IoT Security Exercise Contents for Cyber Security Exercise System." In 2020 13th International Conference on Human System Interaction (HSI) (pp. 1-6). IEEE.
  10. N. Kalbo, Y. Mirsky, A. Shabtai, & Y. Elovici, (2019). "The Security of IP-based Video Surveillance Systems." arXiv preprint arXiv:1910.10749.
  11. M. Swan, (2012). "Sensor mania! the internet of things, wearable computing, objective metrics, and the quantified self 2.0." Journal of Sensor and Actuator networks, 1(3), 217-253. https://doi.org/10.3390/jsan1030217
  12. Markit (2019) "The top trends of 2019: powered by transformative technologies".
  13. R. Alharbi, & D. Aspinall (2018). "An IoT analysis framework: An investigation of IoT smart cameras vulnerabilities."
  14. J. Liranzo, & T. Hayajneh, (2017, October). "Security and privacy issues affecting cloud-based IP camera." In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (pp. 458-465). IEEE.
  15. A. Tekeoglu, & A. S. Tosun, (2015, August). "Investigating security and privacy of a cloud-based wireless IP camera: NetCam." In 2015 24th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-6). IEEE.
  16. A. Costin, (2016, October). "Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations." In Proceedings of the 6th international workshop on trustworthy embedded devices (pp. 45-54).
  17. L Qiao,., & K Nahrstedt,. (1997, July). "A new algorithm for MPEG video encryption." In Proc. of First International Conference on Imaging Science System and Technology (pp. 21-29).
  18. C shi,., & B Bhargava. (1998, October). "An efficient MPEG video encryption algorithm." In Proceedings seventeenth IEEE symposium on reliable distributed systems (Cat. No. 98CB36281) (pp. 381-386). IEEE
  19. U Potdar,., K. T Talele,., & S. T. Gandhe, (2009, January). "Comparison of MPEG video encryption algorithms". In Proceedings of the International Conference on Advances in Computing, Communication and Control (pp. 289-294)
  20. S. Bird, E. Klein, & E. Loper, (2009). "Natural language processing with Python: analyzing text with the natural language toolkit." " O'Reilly Media, Inc.".