Node Security Mechanisms for Secure Embedded Systems
Sign up for access to the world's latest research
Abstract
Distributed smart cameras are spreading due to its wide range of applications. Previously we used digital cameras to capture the images based on the pixels but nowadays we are using smart cameras to analyze and describe the captured video. Smart cameras are better than digital camera to use. Distributed smart cameras are used in public and private places to access and manipulate private or sensitive information like human's personal movements, traffic surveillance, animal identification, and face identification, so architecture needs security and privacy issues. Privacy issues are defined by taking the sytem structure security into consideration. In this paper, we describe distributed smart camera system security requirements, attacks, and risks. Here we discussed and analyzed security and privacy issues in node level also all the present available solutions which defend attacks.
Related papers
ACM Transactions on Embedded Computing Systems, 2010
In this article, we describe a distributed, peer-to-peer gesture recognition system along with a software architecture modeling technique and authority control protocol for ubiquitous cameras. This system performs gesture recognition in real time by combining imagery from multiple cameras without using a central server. We propose a system architecture that uses a network of inexpensive cameras to perform in-network video processing. A methodology for transforming well-designed single-node algorithm to distributed system is also proposed. Applications for ubiquitous cameras can be modeled as the composition of a finite-state machine of the system, functional services, and middleware. A service-oriented software architecture is proposed to dynamically reconfigure services when system state changes. By exchanging data and control messages between neighboring sensors, each node can maintain broader view of the environment with integrated video-processing results. Our prototype system i...
Proceedings of the 2020 4th International Conference on Cloud and Big Data Computing, 2020
In wireless multimedia surveillance networks (WMSNs), the sensors generate continuous data streams which are saved on cloud servers for processing and future use. Large-scale security and monitoring decisions are based on the video data fed back to the cloud by the visual sensors. Internet of Things (IoT) networks are deployed in certain resource constrained scenarios where edge computing is not available for data analytics and security considering the IoT devices have also limited resources such as memory, power and processing capabilities. In this paper, the problems of limited resources and data security are addressed by the proposal of a secure model for video surveillance systems working in resource constrained IoT assisted scenarios. The suggested approach comprises of the following four main stages: i) save only those video frames in which any activity is detected, ii) encrypt the saved frames for secure transmission, iii) synchronize the encrypted frames between cloud and sensor node and iv) remove the transmitted frames from sensor and decrypt the stored data on cloud. The performance of the encryption process for resource constrained devices is analyzed on different types of sensor nodes during experimentation. The results prove that the proposed method automates and speeds up the process of live video data extraction and occupies less space on cloud when compared to the conventional approach for saving surveillance videos. Furthermore, adding encryption to video frames ensures integrity of video data during their journey from sensor to the cloud. CCS Concepts • Security and privacy ➝ Database and storage security ➝ Management and querying of encrypted data
2007 IEEE Conference on Computer Vision and Pattern Recognition, 2007
Considerable research work has been done in the area of surveillance and biometrics, where the goals have always been high performance, robustness in security and cost optimization. With the emergence of more intelligent and complex video surveillance mechanisms, the issue of "privacy invasion" has been looming large. Very little investment or effort has gone into looking after this issue in an efficient and cost-effective way. The process of PICO (Privacy through Invertible Cryptographic Obscuration) is a way of using cryptographic techniques and combining them with image processing and video surveillance to provide a practical solution to the critical issue of "privacy invasion". This paper presents the idea and example of a real-time embedded application of the PICO technique, using uCLinux on the tiny Blackfin DSP architecture, along with a small Omnivision camera. It demonstrates how the practical problem of "privacy invasion" can be successfully addressed through DSP hardware in terms of smallness in size and cost optimization. After review of previous applications of "privacy protection", and system components, we discuss the "embedded jpeg-space" detection of regions of interest and the real time application of encryption techniques to improve privacy while allowing general surveillance to continue. The resulting approach permits full access (violation of privacy) only by access to the private-key to recover the decryption key, thereby striking a fine trade-off among privacy, security, cost and space.
With the increasing use of embedded devices in our daily life, security threats have also been increasing in a proportional rate. However, ensuring security in the embedded systems has become a great challenge not only for the embedded device experts but also for the manufacturers. The problem especially arises because of the limited hardware and software implementation options for the designers. At the same time, companies are trying to keep the vulnerabilities of the operating system of those embedded devices in secret and they are not relieving any necessary security updates quickly. It has become very urgent to ensure proper security of the embedded systems to save it from any major technological disaster near future. In this paper, we have broadly discussed the structures, characteristics and applications of different embedded devices in our daily life. Beside this, we have also discussed about the different causes of security threats and some of our suggested solutions to protect the systems from the attackers as well that we have found in our research
2009
As Wireless Sensor Network-based solutions are proliferating they are facing new challenges: they must be capable of adapting to rapidly changing environments and requirements while their nodes should have low power consumption as they usually run on batteries. Moreover, the security aspect is crucial since they frequently transmit and process very sensitive data, while it is important to be able to support real-time video or processed images over their limited bandwidth links. SMART targets to design and implement a highly reconfigurable Wireless Visual Sensor Node (WVSN) defined as a miniaturized, light-weight, secure, low-cost, battery powered sensing device, enriched with video and data compression capabilities. Index Items: component Wireless sensor networks, reconfigurable hardware, security, video transmission I. 978-1-4244-3938-6/09/$25.00 (c)2009 IEEE
Intelligent Multimedia Surveillance, 2013
Video surveillance systems are usually installed to increase the safety and security of people or property in the monitored areas. Typical threat scenarios are robbery, vandalism, shoplifting or terrorism. Other application scenarios are more intimate and private such as home monitoring or assisted living. For a long time it was accepted that the potential benefits of video surveillance go hand in hand with a loss of personal privacy. However, with the on-board processing capabilities of modern embedded systems it becomes possible to compensate this privacy loss by making security and privacy protection inherent features of video surveillance cameras. In the first part of this chapter we motivate the need for the integration of security and privacy features, we discuss fundamental requirements and provide a comprehensive review of the state of the art. The second part presents the TrustCAM prototype system where a dedicated hardware security module is integrated into a camera system to achieve a high level of security. The chapter is concluded by a summary of open research issues and an outlook to future trends. 1 The Need for Security and Privacy Protection Reasons for deploying video surveillance systems are manifold. Frequently mentioned arguments are ensuring public safety, preventing vandalism and crime as well as investigating criminal offenses [40]. As part of that, cameras are often installed in public environments such as underground or train stations, in buses [39] or taxis [20], along roads and highways [8, 23], in sports stadiums or in shopping
Proceedings of the IEEE, 2000
In systems where small, dispersed video-audio sensors feed data to a central observation station, power available for signal processing, networking and cryptography is severely limited and must be conserved.
In a world of pervasive computing, embedded systems can be found in a wide range of products and are employed in various heterogeneous domains. The abovementioned devices often need to access, store, manipulate and/or communicate sensitive or even critical information, making the security of their resources and services an important concern in their design process. These issues are further exacerbated by the resource-constrained nature of the devices, in conjunction with the ever-present need for smaller size and lower production costs. This paper aims to provide an overview of the challenges in designing secure embedded systems, covering both node hardware and software issues, as well as relevant network protocols and cryptographic algorithms. Moreover, recent advances in the field are identified, highlighting opportunities for future research.
International Journal of Computer Applications, 2015
Security in today's wireless camera sensor networks is very crucial for authentication of video feeds from appropriate sources. This will ensure the safety and security of the digital video feeds as well as provide means of authenticating the video. These authentication approaches should be able to identify tamper detection. In this paper, we propose an embedding technique for authentication of video feeds obtained from wireless camera sensor networks. These approaches are able make the signals more secured and easily verifiable.
2008 15th IEEE International Conference on Image Processing, 2008
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and controlling of the privacy visual data through two innovations. First, unlike the existing centralized control of privacy data, the proposed system allows individual users to make the final decision on every access to their privacy data. As such, it offers a much stronger form of privacy protection as the user no longer needs to trust, adhere or register his/her privacy preferences with a server. The second innovation is the development of a secure reversible data hiding scheme for embedding all the ownership information and privacy data into the obfuscated video bitstream. Not only has it resulted in an efficient design of protocols, the reversible data hiding allows perfect reconstruction of original data and supports arbitrary types of video obfuscation techniques. Impact of data hiding on bitrate and distortion is minimized through a rate-distortion optimization procedure and experimental results are provided to demonstrate its efficiency.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (8)
- References
- A. Serpanos, D.N. Papalambrou, "Security and privacy in distributed smart cameras," in Proceedings of the IEEE, vol. 96, pp. 1678-1687, 2008.
- A. C. S. Ravi, S. Raghunathan, "Tamper resistance mechanisms for secure embedded systems," pp. 605- 611, 2004.
- W. Wolf, B. Ozer, and T. Lv, "Smart cameras as embedded systems," Computer, vol. 35, no. 9, pp. 48- 53, 2002.
- A. D. Rubin and J. Daniel E. Geer, "Mobile code security," IEEE Internet Computing, vol. 2, no. 6, pp. 30-34, 1998.
- W. Wolf, B. Ozer, and T. Lv, "Smart cameras as embedded systems," Computer, vol. 35, no. 9, pp. 48- 53, 2002.
- S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in embedded systems: Design challenges," Trans. on Embedded Computing Sys., vol. 3, no. 3, pp. 461-491, 2004.
- B. Yong Wang Attebury, G. Ramamurthy, "A survey of security issues in wireless sensor networks," in Communications Surveys and Tutorials, IEEE, pp. 2-23, 2006.