Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

[1]  Kyungroul Lee,et al.  Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System , 2011 .

[2]  Radek Martinek,et al.  Development and testing of a visualization application software, implemented with wireless control system in smart home care , 2014, Human-centric Computing and Information Sciences.

[3]  T PandurangaH.,et al.  Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator , 2013, J. Inf. Process. Syst..

[4]  Chin-Tser Huang,et al.  Chinese remainder theorem based group key management , 2007, ACM-SE 45.

[5]  Marek R. Ogiela,et al.  Security of Linguistic Threshold Schemes in Multimedia Systems , 2009, KES IIMSS.

[6]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[7]  Wei-Ho Chung,et al.  A Cross-Layer Unequal Error Protection Scheme for Prioritized H.264 Video using RCPC Codes and Hierarchical QAM , 2013, J. Inf. Process. Syst..

[8]  F. Rico-Novella,et al.  Improved LKH for batch rekeying in multicast groups , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..

[9]  Elijah Blessing Rajsingh,et al.  Smart card based time efficient authentication scheme for global grid computing , 2012, Human-centric Computing and Information Sciences.

[10]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[11]  Vangalur S. Alagar,et al.  Publishing and discovering context-dependent services , 2013, Human-centric Computing and Information Sciences.

[12]  Marek R. Ogiela,et al.  Linguistic protocols for secure information management and sharing , 2012, Comput. Math. Appl..

[13]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[14]  Mamta Juneja,et al.  A New Approach for Information Security using an Improved Steganography Technique , 2013, J. Inf. Process. Syst..

[15]  Hua Wang,et al.  A secure multicast protocol with copyright protection , 2002, CCRV.

[16]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[17]  Adrian Perrig,et al.  Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication , 1999 .

[18]  Dongho Won,et al.  Lightweight anonymous authentication scheme with unlinkability in global mobility networks , 2014 .

[19]  Kyungran Kang,et al.  A Distributed Multicast Group Key Management Scheme for a Hierarchically Structured Network , 2011 .

[20]  Ashok Samal,et al.  A dual encryption protocol for scalable secure multicasting , 1999, Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).