Open Access
Subscription Access
A Study on Security of IP Cameras and Its Awareness
Subscribe/Renew Journal
IP/smart cameras or Internet of Things (IoT) have become a popular trend over the years thanks to their many capabilities. They can automate, make tasks more manageable and monitor your home efficiently, and at the same time, make you feel safer. However, because these devices can connect to the internet, there is a possibility that they can become a security risk to the users. Whenever a smart device is accessible on the internet, it is possible for other individuals, or hackers to access the device. This research aims to identify and analyze consumers’ basic knowledge about network security and the dangers of unsecured IP cameras. The research comprises of a survey on security awareness on these devices, and experiments on exploitation of known vulnerabilities. With the results, we can understand and learn major issues about security of these devices.
Keywords
Internet of Things, IoT, IP Camera , Network Camera.
User
Subscription
Login to verify subscription
Font Size
Information
- Tiagosantos, “How healthy is the internet?”, 2018. https://internethealthreport.org/2018/introduction/how-healthy-is-the-internet/ (accessed December, 2021).
- P. A. Abdalla and C. Varol, "Testing IoT Security: The Case Study of an IP Camera", in 8th Int. Symp. Digit. Forensics Secur. (ISDFS), 2020, pp. 1–5, doi: 10.1109/ISDFS49300.2020.9116392
- A. Tekeoglu and A. S. Tosun, "Investigating Security and Privacy of a Cloud-Based Wireless IP Camera: NetCam," in 24th Int. Conf. Comput. Communication Netw. (ICCCN), 2015, pp. 1–6, doi: 10.1109/ICCCN.2015.7288421
- B. Cusack and Z. Tian, “Evaluating IP surveillance camera vulnerabilities,” in Valli, C. (Ed.). (2017), The Proc. 15th Australian Inf. Security Manage. Conf., 5-6 December, 2017, Edith Cowan University, Perth, Western Australia (pp.25-32).
- J. Bugeja, D. Jönsson and A. Jacobsson, "An investigation of vulnerabilities in smart connected cameras," in 2018 IEEE Int. Conf. Pervasive Comput. and Commun. Workshops (PerCom Workshops), 2018, pp. 537–542, doi: 10.1109/PERCOMW.2018.8480184
- N. Kalbo, Y. Mirsky, A. Shabtai, and Y. Elovici, "The Security of IP-Based Video Surveillance Syst.," J. Sensors, vol. 20, no. 17, 4806, 2020, doi: 10.3390/s20174806
- G. Kim and J. Han, "Security model for video surveillance system," in 2012 Int. Conf. ICT Convergence (ICTC), 2012, pp. 100–104, doi: 10.1109/ICTC.2012.6386789
- A. Costin, “Security of CCTV and video surveillance syst.: Threats, vulnerabilities, attacks, and mitigations,” in TrustED '16: Proc. of the 6th Int. Workshop Trustworthy Embedded Devices, October 2016, pp. 45–54, doi: 10.1145/2995289.2995290
- B. Li, Y. Zhu, Q. Liu, Z. Zhou, and L. Guo, "Hunting for invisible SmartCam: Characterizing and detecting smart camera based on netflow analysis," in IEEE Int. Conf. Commun. (ICC), 2019, pp. 1–7, doi: 10.1109/ICC.2019.8761517
- J. Liranzo and T. Hayajneh, "Security and privacy issues affecting cloud-based IP camera," in 2017 IEEE 8th Annu. Ubiquitous Comput., Electronics Mobile Commun. Conf. (UEMCON), 2017, pp. 458–465, doi: 10.1109/UEMCON.2017.8249043
- C. J. Koo and J. Y. Kim, “Enforcing high-level security policies for Internet of Things”, J. Supercomputing, 2018, 74, pp. 4497–4505, doi: 10.1007/s11227-017-2201-9
- G. Lee, “What roles should the government play in fostering the advancement of the Internet of Things?,” Telecommun. Policy, vol. 43, no. 5, pp. 434–444, 2019, doi: 10.1016/j.telpol.2018.12.002
- M. Berger, “Man really did hack Trump's Twitter account by guessing password, 'maga2020!,' Dutch prosecutors say,” The Washington Post, 2020. https://www.washingtonpost.com/world/2020/12/17/dutch-trump-twitter-password-hack/ (accessed December 2021)
- B. Schneier, “Applied cryptography: Protocols, algorithms, and source code in C 2nd Ed,” Wiley, 1996.
Abstract Views: 252
PDF Views: 0