Design of IP camera access control protocol by utilizing hierarchical group key

Jungho Kang, Jaekyung Han, Jong Hyuk Park

Research output: Contribution to journalArticlepeer-review

9 Scopus citations

Abstract

Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

Original languageEnglish
Pages (from-to)1567-1586
Number of pages20
JournalSymmetry
Volume7
Issue number3
DOIs
StatePublished - 2015

Keywords

  • Access control management
  • Authentication
  • Hierarchical group-key
  • IP camera
  • Protocol

Fingerprint

Dive into the research topics of 'Design of IP camera access control protocol by utilizing hierarchical group key'. Together they form a unique fingerprint.

Cite this