期刊论文详细信息
Symmetry
Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key
Jungho Kang2  Jaekyung Han3  Jong Hyuk Park1 
[1] Department of Computer Science and Engineering, Seoul National University of Science and Technology, Gongneung 2-dong, Nowon-Gu, Seoul 139-743, Korea;Department of Computing, Soongsil University, 402 Information Science Building, 369 Sangdo-Ro, Dongjak-Gu, Seoul 156-743, Korea; E-Mail:;Department of Construction Legal Affairs, The Graduate School of Construction Legal Affairs, Kwangwoon University, 20 Kwangwoon-Ro, Nowon-Gu, Seoul 139-701, Korea; E-Mail:
关键词: IP camera;    access control management;    hierarchical group-key;    authentication;    protocol;   
DOI  :  10.3390/sym7031567
来源: mdpi
PDF
【 摘 要 】

Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

【 授权许可】

CC BY   
© 2015 by the authors; licensee MDPI, Basel, Switzerland.

【 预 览 】
附件列表
Files Size Format View
RO202003190007167ZK.pdf 1056KB PDF download
  文献评价指标  
  下载次数:13次 浏览次数:24次