scholarly journals The Security of IP-Based Video Surveillance Systems

Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4806
Author(s):  
Naor Kalbo ◽  
Yisroel Mirsky ◽  
Asaf Shabtai ◽  
Yuval Elovici

Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user’s privacy. In this review, we explore the attack surface of modern surveillance systems and enumerate the various ways they can be compromised with real examples. We also identify the threat agents, their attack goals, attack vectors, and the resulting consequences of successful attacks. Finally, we present current countermeasures and best practices and discuss the threat horizon. The purpose of this review is to provide researchers and engineers with a better understanding of a modern surveillance systems’ security, to harden existing systems and develop improved security solutions.

2021 ◽  
Vol 54 (6) ◽  
pp. 1-38
Author(s):  
Peter Kietzmann ◽  
Thomas C. Schmidt ◽  
Matthias Wählisch

Random numbers are an essential input to many functions on the Internet of Things (IoT). Common use cases of randomness range from low-level packet transmission to advanced algorithms of artificial intelligence as well as security and trust, which heavily rely on unpredictable random sources. In the constrained IoT, though, unpredictable random sources are a challenging desire due to limited resources, deterministic real-time operations, and frequent lack of a user interface. In this article, we revisit the generation of randomness from the perspective of an IoT operating system (OS) that needs to support general purpose or crypto-secure random numbers. We analyze the potential attack surface, derive common requirements, and discuss the potentials and shortcomings of current IoT OSs. A systematic evaluation of current IoT hardware components and popular software generators based on well-established test suits and on experiments for measuring performance give rise to a set of clear recommendations on how to build such a random subsystem and which generators to use.


Subject Prospects for cybersecurity in 2019 Significance Cybersecurity is now a chief concern for both private sector organisations and governments, both of which are doing their best to eliminate ‘low-hanging’ vulnerabilities, but new developments such as the rapid expansion of the Internet of Things (IoT) are broadening the attack surface.


Author(s):  
Dmitry S. Zaichenko ◽  
Irina S. Sineva

Research and development in the field of the Internet of Things, or more generally M2M systems security, is the subject of daily discussion in the ICT market. With the rapid development of intelligent devices, the necessity of valuable information protection has generated many new methods and technologies. Stegoimages, along with genetic algorithms (GA), are a relatively new object in the field of information hiding. The assumption that their application can significantly improve the noise-resistant properties of stegofiles is justified by the properties of the GA, but it is a subject for detailed study, since in such an application the GA has not yet been considered. The proposed method is based on genetic coding that hides messages between Internet of Things devices and is capable of detecting both internal and external attacks in the intellectual infrastructure. A sufficiently high efficiency of preliminary GA coding is shown for objects such as hiding graphic information in a graphic stegocontainer.


2019 ◽  
pp. 958-964 ◽  
Author(s):  
Wissam Abbass ◽  
◽  
Zineb Bakraouy ◽  
Amine Baina ◽  
Mostafa Bella

2019 ◽  
Vol 75 (3) ◽  
pp. 380-394
Author(s):  
Uday Khanapurkar

Huawei, the Chinese telecom giant, has emerged as a key player in the provision of infrastructure required to support 5G wireless networks, the adoption of which will be foundational to recipient countries’ deployment of emerging technologies such as artificial intelligence and the Internet of things.   At the same time, however, security concerns with respect to Huawei’s ties to the Chinese army and state abound, prompting a number of countries to ban the company from supplying them said telecom infrastructure. India, however, is on the fence in this regard. This article assesses India’s Huawei conundrum through a conceptual framework of economic dependence wherein the costs of a ban and willingness to ban are examined in detail. It is argued that since the expected costs of banning Huawei equipment and the security risks of using them are both substantially high, India’s course of action must be to defer a quick decision and bargain for benefits and assurances.


2017 ◽  
Vol 02 (02) ◽  
pp. 1750008 ◽  
Author(s):  
Jin Ho Kim

Due to the increasing ubiquity of the internet, the “internet of things” (IoT) has become an essential technology, penetrating people’s daily lives and influencing the industry. However, the diversity of environments and lack of standards have left the IoT exposed to security and privacy threats. This paper examines these risks, the security requirements of the IoT, the time trend of IoT-security related research, and key security technologies related to the IoT.


Sign in / Sign up

Export Citation Format

Share Document