Abstract

The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in the sense that all things are connected to the Internet, and network attacks that have thus far been exploited in the existing PC environment are now also occurring frequently in the IoT environment. In fact, there have been many security incidents such as DDoS attacks involving the hacking of IP cameras, which are typical IoT devices, leakages of personal information and the monitoring of numerous persons without their consent. While attacks in the existing Internet environment were PC-based, we have confirmed that various smart devices used in the IoT environment—such as IP cameras and tablets—can be utilized and exploited for attacks on the network. Even though it is necessary to apply security solutions to IoT devices in order to prevent potential problems in the IoT environment, it is difficult to install and execute security solutions due to the inherent features of small devices with limited memory space and computational power in this aforementioned IoT environment, and it is also difficult to protect certificates and encryption keys due to easy physical access. Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security framework designed to prevent them. The results of the performance evaluation of this study confirm that the proposed protocol is able to cope with various security threats in the network. Furthermore, from the perspective of energy efficiency, it was also possible to confirm that the proposed protocol is superior to other cryptographic protocols. Thus, it is expected to be effective if applied to the IoT environment.

Highlights

  • As Internet technology has developed rapidly, and its penetration rate has increased greatly in recent years, the Internet environment has a closer relationship with humans, and technology related with the so-called Internet of Things (IoT) is becoming increasingly widespread

  • By examining cases of such attacks, it was possible to confirm that smart devices used in the IoT environment, including DVRs, tablets, CCTVs (Closed Circuit Televisions) and other everyday smart devices, can be used for network attacks [1,2]

  • The IP camera field, which is the environment proposed in this paper, and many IoT services and devices are under development with a view to applying IOT technology in the fields of crime and disaster prevention

Read more

Summary

Introduction

As Internet technology has developed rapidly, and its penetration rate has increased greatly in recent years, the Internet environment has a closer relationship with humans, and technology related with the so-called Internet of Things (IoT) is becoming increasingly widespread. As IoT technology develops and demand for it increases, various types of security incidents are taking place due to exploitation of the growing number of security vulnerabilities. As an example of a major security incident, numerous IoT devices were infected and exploited by a large-scale DDoS attack on the Internet domain service provider Dyn, which for several hours made it impossible to access dozens of popular websites such as The New York Times, Twitter, Netflix, and Amazon. To attack the IoT devices, “root” and “admin”, and “admin” and “password” were mainly used as the ID and password combinations, respectively. These combinations could be used to exploit the fact that the product default values had not been changed. In this paper, we discuss the trends and security problems of IP cameras used in the above cases in the IoT environment, and propose a secure method of communication by configuring the NVR network security design system

Internet of Things
IP Camera Trends
IP Camera Market Trends
Cases of IP Camera Security
Methods
Sniffing and Spoofing
DVR and NVR
Contents of the Proposed System
Internal Connection Protocol
Registration Procedure
Overview of Image Viewing
Exchange of Keys to Secure Safety
Video Image Monitoring
Security Evaluation
Mutual Authentication
Reuse Attack
Message Forgery Attack
Sniffing
Spoofing
Side-Channel Attack
Performance Evaluation
GHz Intel Core i5-4690
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call