scholarly journals Attacks and Preventive Measures on Video Surveillance Systems: A Review

2021 ◽  
Vol 11 (12) ◽  
pp. 5571
Author(s):  
Preethi Vennam ◽  
Pramod T. C. ◽  
Thippeswamy B. M. ◽  
Yong-Guk Kim ◽  
Pavan Kumar B. N.

Video surveillance systems are widely deployed with large systems for use in strategic places such as home security, public transportation, banks, ATM centers, city centers, airports, and public roads, and play a vital role in protecting critical infrastructures. As various attacks are possible in these systems, identifying attacks and considering suitable security measures are essential. In this paper, we present a detailed review of existing and possible threats in video surveillance, CCTV, and IP-camera systems. This provides insight for the better identification of the security risks associated with the design and deployment of these systems and promotes further research in this emerging field. We also present countermeasures to prevent and protect the surveillance systems from various security attacks.

Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4806
Author(s):  
Naor Kalbo ◽  
Yisroel Mirsky ◽  
Asaf Shabtai ◽  
Yuval Elovici

Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user’s privacy. In this review, we explore the attack surface of modern surveillance systems and enumerate the various ways they can be compromised with real examples. We also identify the threat agents, their attack goals, attack vectors, and the resulting consequences of successful attacks. Finally, we present current countermeasures and best practices and discuss the threat horizon. The purpose of this review is to provide researchers and engineers with a better understanding of a modern surveillance systems’ security, to harden existing systems and develop improved security solutions.


Author(s):  
Gajendra Singh ◽  
Rajeev Kapoor ◽  
Arun K. Khosla

With the growing demands of safety for people and their properties, video surveillance has drawn much attention. These requirements have led to the positioning of cameras almost every corner. Smart video surveillance systems can interpret the situation and automatically recognize abnormal situations, which plays a vital role in intelligence monitoring systems. One vital aspect is to detect and alert generation of suspicious events then to notify operators or users automatically. A long time may pass before an event of interest to take place. In such situations, human attention may get diverted and an event of interest may get missed. In such case, video surveillance systems can effectively improve safety and security for the control and management of public areas or personal life. Independent surveillance systems to replace the traditional (human observer-oriented) systems also can relieve the workload of relative personnel.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4419
Author(s):  
Hao Li ◽  
Tianhao Xiezhang ◽  
Cheng Yang ◽  
Lianbing Deng ◽  
Peng Yi

In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention. At present, many researchers focus on how to select the region of interest (RoI) accurately and then realize privacy protection in videos by selective encryption. However, relatively few researchers focus on building a security framework by analyzing the security of a video surveillance system from the system and data life cycle. By analyzing the surveillance video protection and the attack surface of a video surveillance system in a smart city, we constructed a secure surveillance framework in this manuscript. In the secure framework, a secure video surveillance model is proposed, and a secure authentication protocol that can resist man-in-the-middle attacks (MITM) and replay attacks is implemented. For the management of the video encryption key, we introduced the Chinese remainder theorem (CRT) on the basis of group key management to provide an efficient and secure key update. In addition, we built a decryption suite based on transparent encryption to ensure the security of the decryption environment. The security analysis proved that our system can guarantee the forward and backward security of the key update. In the experiment environment, the average decryption speed of our system can reach 91.47 Mb/s, which can meet the real-time requirement of practical applications.


2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Chun-Yuan Fan ◽  
Chia-Ping Lin ◽  
Guo-Dung J. Su

Abstract Wide-angle optical systems play a vital role in imaging applications and have been researched for many years. In traditional lenses, attaining a wide field of view (FOV) by using a single optical component is difficult because these lenses have crucial aberrations. In this study, we developed a wide-angle metalens with a numerical aperture of 0.25 that provided a diffraction-limited FOV of over 170° for a wavelength of 532 nm without the need for image stitching or multiple lenses. The designed wide-angle metalens is free of aberration and polarization, and its full width of half maximum is close to the diffraction limit at all angles. Moreover, the metalens which is designed through a hexagonal arrangement exhibits higher focusing efficiency at all angles than most-seen square arrangement. The focusing efficiencies are as high as 82% at a normal incident and 45% at an incident of 85°. Compared with traditional optical components, the proposed metalens exhibits higher FOV and provides a more satisfactory image quality because of aberration correction. Because of the advantages of the proposed metalens, which are difficult to achieve for a traditional single lens, it has the potential to be applied in camera systems and virtual and augmented reality.


Sign in / Sign up

Export Citation Format

Share Document