scholarly journals Real-Time Secure/Unsecure Video Latency Measurement/Analysis with FPGA-Based Bump-in-the-Wire Security

Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2984 ◽  
Author(s):  
Admir Kaknjo ◽  
Muzaffar Rao ◽  
Edin Omerdic ◽  
Thomas Newe ◽  
Daniel Toal

With the growth of the internet of things (IoT), many challenges like information security and privacy, interoperability/standard, and regulatory and legal issues are arising. This work focused on the information security issue, which is one of the primary challenges faced by connected systems that needs to be resolved without impairing system behaviour. Information, which is made available on the Internet by the things, varies from insensitive information (e.g., readings from outdoor temperature sensors) to extremely sensitive information (e.g., video stream from a camera) and needs to be secured over the Internet. Things which utilise cameras as a source of information pertain to a subclass of the IoT called IoVT (internet of video things). This paper presents secured and unsecured video latency measurement results over the Internet for a marine ROV (remotely operated vehicle). A LabVIEW field programmable gate arrays (FPGAs)-based bump-in-the-wire (BITW) secure core is used to provide an AES (advanced encryption standard)-enabled security feature on the video stream of an IoVT node (ROV equipped with a live-feed camera). The designed LabVIEW-based software architecture provides an option to enable/disable the AES encryption for the video transmission. The latency effects of embedding encryption on the stream with real-time constraints are measured and presented. It is found that the encryption mechanism used does not greatly influence the video feedback performance of the observed IoVT node, which is critical for real-time secure video communication for ROV remote control and piloting. The video latency measurement results are taken using 128, 256 and 512 bytes block lengths of AES for both H.264 and MJPEG encoding schemes transmitted over both TCP and UDP transmission protocols. The latency measurement is performed in two scenarios (i.e., with matching equipment and different equipment on either end of the transmission).

2018 ◽  
Vol 2018 ◽  
pp. 1-19 ◽  
Author(s):  
Admir Kaknjo ◽  
Muzaffar Rao ◽  
Edin Omerdic ◽  
Luke Robinson ◽  
Daniel Toal ◽  
...  

This work presents a detailed study, characterization, and measurement of video latency in a real-time video streaming application. The target application consists of an automatic control system in the form of a control station and the mini Remotely Operated Vehicle (ROV) equipped with a camera, which is controllable over local area network (LAN) and the Internet. Control signal transmission and feedback measurements to the operator usually impose real-time constraints on the network channel. Similarly, the video stream, which is required for the normal system control and maneuvering, imposes further strict requirements on the network in terms of bandwidth and latency. Based on these requirements, controlling the system in real time through a standard Internet connection is a challenging task. The measurement of important network parameters like availability, bandwidth, and latency has become mandatory for remotely controlling the system in real time. It is necessary to establish a methodology for the measurement of video and network latency to improve the real-time controllability and safety of the system as such measurement is not possible using existing solutions due to the following reasons: insufficient accuracy, relying on the Internet resources such as generic Network Time Protocol (NTP) servers, inability to obtain one-way delay measurement, and many solutions only having support for web cameras. Here, an efficient, reliable, and cost-effective methodology for the measurement of latency of a video stream over a LAN and the Internet is proposed. A dedicated stratum-1 NTP server is used and the necessary software needed for acquiring and measuring the latency of a video stream from a generic IP camera as well as integration into the existing ROV control software was developed. Here, by using the software and dedicated clock synchronization equipment (NTP server), it was found that normal video latencies in a LAN were in the range of 488ms – 850ms, while latencies over the Internet were measured to be in the range of 558ms – 1211ms. It is important to note that the values were obtained by using a generic (off-the-shelf) IP camera and they represent the actual latencies which might be experienced during control over long range and across international territory borders.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2013
Author(s):  
Shams Ud Din ◽  
Zahoor Jan ◽  
Muhammad Sajjad ◽  
Maqbool Hussain ◽  
Rahman Ali ◽  
...  

Security and privacy are essential requirements, and their fulfillment is considered one of the most challenging tasks for healthcare organizations to manage patient data using electronic health records. Electronic health records (clinical notes, images, and documents) become more vulnerable to breaching patients’ privacy when shared with an external organization in the current arena of the internet of medical things (IoMT). Various watermarking techniques were introduced in the medical field to secure patients’ data. Most of the existing techniques focus on an image or document’s imperceptibility without considering the watermark(logo). In this research, a novel technique of watermarking is introduced, which supersedes the shortcomings of existing approaches. It guarantees the imperceptibility of the image/document and takes care of watermark(biometric), which is further passed through a process of recognition for claiming ownership. It extracts suitable frequencies from the transform domain using specialized filters to increase the robustness level. The extracted frequencies are modified by adding the biomedical information while considering the strength factor according to the human visual system. The watermarked frequencies are further decomposed through a singular value decomposition technique to increase payload capacity up to (256 × 256). Experimental results over a variety of medical and official images demonstrate the average peak signal-to-noise ratio (PSNR 54.43), and the normal correlation (N.C.) value is 1. PSNR and N.C. of the watermark were calculated after attacks. The proposed technique is working in real-time for embedding, extraction, and recognition of biometrics over the internet, and its uses can be realized in various platforms of IoMT technologies.


10.28945/2956 ◽  
2006 ◽  
Author(s):  
Sangmi Chai ◽  
Sharmistha Bagchi-Sen ◽  
Claudia Morrell ◽  
H. Raghav Rao ◽  
Shambhu Upadhyaya

Information security and privacy on the Internet are critical issues in our society. Importantly, children and adolescents need to understand the potential risk of using the Internet. In this research, we examine factors that motivate students’ Information Security Behavior on the Internet. A pilot survey of middle and junior high school students is the source of the data. This study provides a model that explains students’ behavior pertaining to Information Security. A significant research finding is that students’ perceived importance of Information Security plays a critical role in influencing their Information Security Behavior.


Author(s):  
Xhafer Krasniqi

The Internet of Things that is defined as anything that can be accessible anytime and anywhere provides connectivity to different objects and sensors around us and which will enable the transfer of different data between these objects and devices. A thing in the Internet of Things can be any natural or man-made object that can be assigned an IP address with a capability to exchange date over a network. There is a huge number of applications of IoT to benefit users, such as health monitors, smart homes, connected cars etc. If everything around us is connected and information about these things that can contain sensitive information, e.g. health and other personal information, are collected then these networks become very important and must be able to provide a proper security and privacy. It is believed that by 2020 there will be over 50 billion things that could be connected to Internet. Internet of things are very much associated with M2M (machine to machine communication) that is identified as a technology that makes objects smart, like smart homes, smart utility meters etc. M2M actually is considered to be a subset of IoT and which is mainly used for difficult and dangerous tasks, e.g. nuclear plants, etc. The deployment of IoT has already started and is expected to transform the way we live. According to Gartner, a technology research company, the Internet of Things has just reached the deployment stage by early adopters and the full deployment is expected in over ten years. From an industry angle, this paper will examine the market and technical trends of Internet of Things, main applications that will be supported by this technology, key issues and challenges faced by the industry, standards activities around IoT and finally the implementation landscape.


Author(s):  
Roland Heickerö

One of the most serious threats to a modern country's trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage there may be individual states and security services as well as competing companies. One trend is that criminal players are getting involved both as thieves and fences of information. Computerisation and the development of the Internet drastically increase the possibility of procuring sensitive information through illegal means. This can be done in different ways. In the paper the convergence between industrial- and cyber espionage are discussed. A number of examples are provided of different kinds of espionage as well as some of the methods that is used to collect information over the Internet – such as signals intelligence, monitoring of traffic, penetration and overtaking of computers with the aid of trojans. Examples are given on succesful cybertheft operations such as the operation Buckshot Yankee and the Chinese Ghostnet. The paper ends with a discussion on how to improve information security in organisations in order to reduce the risks for illegitimate information drainage.


2018 ◽  
Vol 7 (2.13) ◽  
pp. 281
Author(s):  
Doaa Yaseen Khudhur ◽  
Saif Saad Hameed ◽  
Shokhan M. Al-Barzinji

The Internet played - and still - the key that continuously changing our ways of interaction with people. As a result, several electronic services had emerged allowing businesses to grow by effectively allowing wide and easy interaction with customers and other businesses. The security and privacy of information over the internet in general and in electronic services providers have been the focus of widely published studies and researches, such that several software and hardware based solutions or hybrid of both is required. E-banking services grown significantly in the last decade where all financial matters of customers and businesses can be done online, and therefore, e-banking security and privacy is important. In this paper, I propose the use of Whirlpool hash function to enhance the security of e-bank service providers by encrypting customer’s card sensitive information. In addition, based on the review of several articles, I found that Whirlpool outperformed several hashing functions and resists several well-known attacks.  


Kapal ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 88-100
Author(s):  
Adella Winanda Hapsari ◽  
Hari Prastowo ◽  
Trika Pitana

Fuel is an important aspect in the operation of ships that require high costs. The high cost of fuel is not followed by an automatic fuel monitoring process. By not using the fuel consumption monitoring method that works automatically, the shipping management does not know for sure the ship's fuel consumption is in accordance with the shipping mileage, thus triggering fraud committed by the ship's crew against the ship's fuel. Fuel consumption monitoring is carried out primarily to identify opportunities to improve energy efficiency and reduce costs. By following technological developments, Internet of Things (IoT) technology has begun to be applied in various industrial fields because it can transmit data in real-time via the internet network without human-to-human or human-to-computer interaction. In this research, the design of models and experiments related to a monitoring system for fuel consumption was carried out using sensors and microcontrollers integrated with the internet to obtain accurate and real-time data. The test results show that the volume of fuel available in the tank, the volume of fuel discharged, the flow rate of fuel, and the location of the system can be known by the user in real-time via the IoT website. Based on the results of measurements using an ultrasonic level sensor, it is known that the measurement results are quite accurate with a deviation of ± 0.5 cm. Meanwhile, the measurement results by the flow sensor are less accurate because the fuel flow only relies on the force of gravity.


2002 ◽  
Vol 24 (1) ◽  
pp. 40
Author(s):  
Rachel Loosley

All three of the Society's Biochemical Basis of Biology videos are now available to view on the Internet, thanks to the Lifesign project. The project's website hosts the digital video programmes, which are fed live to the user's computer screen. Unlike downloading files (which can take absolutely ages!) the video stream is not saved onto the computer; it is sent out from the central server in real time and decoded directly at the user's computer. To view the videos you will need version 6.4 of Microsoft Windows Media Player, which can be downloaded free from the Lifesign website.


2000 ◽  
Vol 21 (3-4) ◽  
pp. 127-134 ◽  
Author(s):  
V. Della Mea ◽  
C. A. Beltrami

The last five years experience has definitely demonstrated the possible applications of the Internet for telepathology. They may be listed as follows: (a) teleconsultation via multimedia e‐mail; (b) teleconsultation via web‐based tools; (c) distant education by means of World Wide Web; (d) virtual microscope management through Web and Java interfaces; (e) real‐time consultations through Internet‐based videoconferencing. Such applications have led to the recognition of some important limits of the Internet, when dealing with telemedicine: (i) no guarantees on the quality of service (QoS); (ii) inadequate security and privacy; (iii) for some countries, low bandwidth and thus low responsiveness for real‐time applications. Currently, there are several innovations in the world of the Internet. Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth.The forthcoming Internet improvements, although induced by electronic commerce, video on demand, and other commercial needs, are of real interest also for telemedicine, because they solve the limits currently slowing down the use of Internet. When such new services will be available, telepathology applications may switch from research to daily practice in a fast way.


2016 ◽  
Vol 6 (1) ◽  
pp. 13-23 ◽  
Author(s):  
Roland Heickerö

One of the most serious threats to a modern country's trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage there may be individual states and security services as well as competing companies. One trend is that criminal players are getting involved both as thieves and fences of information. Computerisation and the development of the Internet drastically increase the possibility of procuring sensitive information through illegal means. This can be done in different ways. In the paper the convergence between industrial- and cyber espionage are discussed. A number of examples are provided of different kinds of espionage as well as some of the methods that is used to collect information over the Internet – such as signals intelligence, monitoring of traffic, penetration and overtaking of computers with the aid of trojans. Examples are given on succesful cybertheft operations such as the operation Buckshot Yankee and the Chinese Ghostnet. The paper ends with a discussion on how to improve information security in organisations in order to reduce the risks for illegitimate information drainage.


Sign in / Sign up

Export Citation Format

Share Document