A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints

Nowadays, the evolving threats of terrorist and criminal attacks against public places have urged the need for active video surveillance systems. Such systems rely on video analytics modules that identify and pre-alarm abnormal events occurring in sensed visual scenes in real-time. By implementing these smart features in the digital cameras, the design of distributed and adaptive physical security policies is made possible. Yet, within these systems, data security and privacy are a major concern. In this paper, we introduce a video surveillance system whose architecture is based on the IoT model. The device layer of this architecture includes smart cameras that communicate in machine-to-machine (M2M) manner. Then, we propose a tunneling framework that ensures the security of the M2M communications. The novelty of this framework is that it uses a shared secret in order to generate a cipher key and the video sensor fingerprints as the main authentication parameter. The security evaluation of our framework has also shown its resistance to well known attacks.

[1]  Kijoon Chae,et al.  Key Establishment and Management for Secure Cellular Machine-to-Machine Communication , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[2]  Abdelmadjid Bouabdallah,et al.  M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.

[3]  Tieniu Tan,et al.  A survey on visual surveillance of object motion and behaviors , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[4]  Yi Zhou,et al.  Understanding the Mirai Botnet , 2017, USENIX Security Symposium.

[5]  Nalini Venkatasubramanian,et al.  Privacy-protecting video surveillance , 2005, IS&T/SPIE Electronic Imaging.

[6]  Alexis Olivereau,et al.  A Distributed Approach for Secure M2M Communications , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[7]  Yue Li,et al.  Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[8]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[9]  George Mastorakis,et al.  Internet of Things (IoT) in 5G Mobile Technologies , 2016 .

[10]  Ki-Hyung Kim,et al.  SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN) , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).

[11]  Jan Lukás,et al.  Camera identification from printed images , 2008, Electronic Imaging.

[12]  N. Boudriga,et al.  Secret-Image Sharing for Multimedia Chaotic Encryption , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.