Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3126686.3126713acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Towards the Security of Motion Detection-based Video Surveillance on IoT Devices

Published: 23 October 2017 Publication History

Abstract

Video surveillance enabled by Internet of Things (IoT) devices, such as smart cameras, has become a popular set of applications recently with the trend of adopting IoT in multimedia signal processing and smart home use cases. Despite its intelligence and convenience, the video motion detection module deployed on the IoT devices poses security challenges due to the sensitive nature of the captured surveillance video and the motion detection operation. In this paper, we investigate the security vulnerabilities of IoT video surveillance from the hardware system point of view. We first develop a proof-of-concept prototype demonstrating video replay attacks, in which the compromised surveillance device hides the chosen suspicious motion by overwriting the corresponding frames with pre-recorded normal frames under the control of the attacker. To address the security concerns, we develop a hardware-based IoT security framework that creates a trusted execution environment and physically isolates the security sensitive components, such as the motion detection module, from the rest of the system. We implement the security framework on an ARM system on chip (SoC). Our evaluations on the real hardware reveal superior security and low performance/power overhead in IoT video surveillance applications.

References

[1]
ARM Security Technology: Building a Secure System using TrustZone Technology. http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.prd29-genc-009492c/index.html.
[2]
Intel Software Guard Extensions. https://software.intel.com/en-us/isa-extensions/intel-sgx.
[3]
Nest Cam Spec Sheet. https://content.abt.com/documents/73396/NC2100ES-specs.pdf.
[4]
Ring Video Doorbell. https://ring.com/.
[5]
2016. iOS Security Guide. https://www.apple.com/business/docs/iOS_Security_Guide.pdf.
[6]
Mamoona Asghar and Mohammad Ghanbari. 2011. Cryptographic keys management for H. 264 scalable coded video security. In Information Security and Cryptology (ISCISC), 2011 8th International ISC Conference on. 83--86.
[7]
Ahmed M. Azab, Kirk Swidowski, Rohan Bhutkar, Jia Ma, Wenbo Shen, Ruowen Wang, and Peng Ning. 2016. SKEE: A Lightweight Secure Kernel-level Execution Environment for ARM. In The Network and Distributed System Security Symposium (NDSS).
[8]
Mainak Banga and Michael S. Hsiao. 2010. A region based approach for the identification of hardware Trojans. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 40--47.
[9]
Andrew Baumann, Marcus Peinado, and Galen Hunt. 2014. Shielding applications from an untrusted cloud with Haven. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 267--283.
[10]
Gedare Bloom, Bhagirath Narahari, and Rahul Simha. 2009. OS support for detecting Trojan circuit attacks. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 100--103.
[11]
Stefan Brenner, Colin Wulf, and Rüdiger Kapitza. 2014. Running ZooKeeper coordination services in untrusted clouds. In USENIX Conference on Hot Topics in System Dependability (HotDep). 2--2.
[12]
Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In USENIX Security Symposium.
[13]
Prithula Dhungel, Xiaojun Hei, Keith W. Ross, and Nitesh Saxena. 2007. The pollution attack in P2P live video streaming: Measurement results and defenses. In Workshop on Peer-to-peer streaming and IP-TV. 323--328.
[14]
Jeremy Dubeuf, David Hély, and Ramesh Karri. 2013. Run-time detection of hardware Trojans: The processor protection unit. In IEEE European Test Symposium (ETS). 1--6.
[15]
Andrew Ferraiuolo, Xuehui Zhang, and Mark Tehranipoor. 2012. Experimental analysis of a ring oscillator network for hardware Trojan detection in a 90nm ASIC. In IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 37--42.
[16]
Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, and Christiano Giuffrida. 2017. ASLR on the line: Practical cache attacks on the MMU. In Network and Distributed System Security Symposium (NDSS).
[17]
Yier Jin and Yiorgos Makris. 2008. Hardware Trojan detection using path delay fingerprint. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 51--57.
[18]
Narjes Jomaa, David Nowak, Gilles Grimaud, and Samuel Hym. 2016. Formal proof of dynamic memory isolation based on MMU. In International Symposium on Theoretical Aspects of Software Engineering (TASE). 73--80.
[19]
Konstantinos Koukos, Alberto Ros, Erik Hagersten, and Stefanos Kaxiras. 2016. Building heterogeneous unified virtual memories (UVMs) without the overhead. ACM Transactions on Architecture and Code Optimization (TACO) 13, 1 (2016), 1.
[20]
Chung-Hsin Liu and Chun-Lin Lo. 2009. The analysis of DDoS attack for the video transmission. In Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human. 394--399.
[21]
Nuno Santos, Himanshu Raj, Stefan Saroiu, and Alec Wolman. 2014. Using ARM TrustZone to build a trusted language runtime for mobile applications. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 67--80.
[22]
Jared Schmitz, Jason Loew, Jesse Elwell, Dmitry Ponomarev, and Nael AbuGhazaleh. 2011. TPM-SIM: a framework for performance evaluation of trusted platform modules. In Design Automation Conference (DAC). 236--241.
[23]
Felix Schuster, Manuel Costa, Cedric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, and Mark Russinovich. 2015. VC3: Trustworthy data analytics in the cloud using SGX. In IEEE Symposium on Security and Privacy. 38--54.
[24]
Prabira Kumar Sethy, Kamal Pradhan, and Santi Kumari Behera. 2016. A security enhanced approach for video steganography using K-Means clustering and direct mapping. In International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). 618--622.
[25]
Jianxiong Shao, Yu Qin, Dengguo Feng, and Weijin Wang. 2015. Formal analysis of enhanced authorization in the TPM 2.0. In ACM Symposium on Information, Computer and Communications Security (ASIA CCS). 273--284.
[26]
Shikha Sharma and Devendra Somwanshi. 2016. A DWT based attack resistant video steganography. In International Conference on Information and Communication Technology for Competitive Strategies. 116.
[27]
Matthew Simpson, Bhuvan Middha, and Rajeev Barua. 2005. Segment protection for embedded systems using run-time checks. In International Conference on Compilers, Architectures and Synthesis for Embedded Systems. 66--77.
[28]
E. Srikanth. 2014. Zynq-7000 AP SoC low power techniques part 2 - Measuring ZC702 power using TI Fusion Power Designer tech tip. http://www.wiki.xilinx.com/Zynq-7000+AP+SoC+Low+Power+Techniques+part+2+-+Measuring+ZC702+Power+using+TI+Fusion+Power+Designer+Tech+Tip.
[29]
Chris Stauffer and W. Eric L. Grimson. 1999. Adaptive background mixture models for real-time tracking. In Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on., Vol. 2. 246--252.
[30]
He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing. 2015. TrustOTP: Transforming smartphones into secure one-time password tokens. In ACM Conference on Computer and Communications Security (CCS). 976--988.
[31]
Viswanathan Swaminathan and Sayaan Mitra. 2012. A partial encryption scheme for AVC video. In IEEE International Conference on Emerging Signal Processing Applications (ESPA). 1--4.
[32]
Viswanathan Swaminathan and Sheng Wei. 2013. Offline protected video playback on heterogeneous platforms. In IEEE International Conference on Multimedia and Expo Workshops (ICME). 1--4.
[33]
Mark Tehranipoor and Farinaz Koushanfar. 2010. A survey of hardware Trojan taxonomy and detection. In IEEE Design & Test of Computers. 10--25.
[34]
Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2013. Steal this movie: Automatically bypassing DRM protection in streaming media services. In USENIX Security Symposium.
[35]
Sheng Wei, Saro Meguerdichian, and Miodrag Potkonjak. 2010. Gate-level characterization: Foundations and hardware security applications. In Design Automation Conference (DAC). 222--227.
[36]
Sheng Wei, James B. Wendt, Ani Nahapetian, and Miodrag Potkonjak. 2014. Reverse engineering and prevention techniques for physical unclonable functions using side channels. In Design Automation Conference (DAC). 1--6.
[37]
Francis Wolff, Chris Papachristou, Swarup Bhunia, and Rajat S. Chakraborty. 2008. Towards Trojan-free Trusted ICs: Problem analysis and detection scheme. In Design, Automation and Test in Europe (DATE). 1362--1365.
[38]
Xilinx Inc. 2014. Programming ARM TrustZone Architecture on the Xilinx Zynq-7000 All Programmable SoC. In UG1019 (v1.0).
[39]
Yan Zhai, Lichao Yin, Jeffrey Chase, Thomas Ristenpart, and Michael Swift. 2016. CQSTR: Securing cross-tenant applications with cloud containers. In ACM Symposium on Cloud Computing (SoCC). 223--236.
[40]
Dawei Zhang, Zhen Han, and Guangwen Yan. 2010. A portable TPM based on USB key. In ACM conference on Computer and Communications Security (CCS). 750--752.
[41]
Xuehui Zhang, Andrew Ferraiuolo, and Mohammad Tehranipoor. 2013. Detection of Trojans using a combined ring oscillator network and off-chip transient power analysis. ACM Journal on Emerging Technologies in Computing Systems 9, 3, Article 25 (2013), 25:1--25:20 pages.

Cited By

View all
  • (2023)Breakthroughs and Challenges in Multimedia Privacy and Security in the Internet of Things (IoT)Intelligent Multimedia Signal Processing for Smart Ecosystems10.1007/978-3-031-34873-0_3(51-83)Online publication date: 1-Oct-2023
  • (2021)Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things ApplicationsIEEE Access10.1109/ACCESS.2021.30855249(80953-80969)Online publication date: 2021
  • (2021)Towards Automated Surveillance: A Review of Intelligent Video SurveillanceIntelligent Computing10.1007/978-3-030-80129-8_53(784-803)Online publication date: 6-Jul-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
Thematic Workshops '17: Proceedings of the on Thematic Workshops of ACM Multimedia 2017
October 2017
558 pages
ISBN:9781450354165
DOI:10.1145/3126686
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. arm trustzone
  2. hardware isolation
  3. internet of things
  4. motion detection
  5. replay attack
  6. video surveillance

Qualifiers

  • Research-article

Funding Sources

  • University of Nebraska Foundation

Conference

MM '17
Sponsor:
MM '17: ACM Multimedia Conference
October 23 - 27, 2017
California, Mountain View, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)2
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Breakthroughs and Challenges in Multimedia Privacy and Security in the Internet of Things (IoT)Intelligent Multimedia Signal Processing for Smart Ecosystems10.1007/978-3-031-34873-0_3(51-83)Online publication date: 1-Oct-2023
  • (2021)Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things ApplicationsIEEE Access10.1109/ACCESS.2021.30855249(80953-80969)Online publication date: 2021
  • (2021)Towards Automated Surveillance: A Review of Intelligent Video SurveillanceIntelligent Computing10.1007/978-3-030-80129-8_53(784-803)Online publication date: 6-Jul-2021
  • (2020)Real Time Image Encoding for Fast IOT (Internet of Things) Based Video Vigilance SystemWireless Personal Communications10.1007/s11277-020-07404-0Online publication date: 23-Apr-2020
  • (2020)Identifying Vulnerabilities in Security and Privacy of Smart Home DevicesNational Cyber Summit (NCS) Research Track 202010.1007/978-3-030-58703-1_13(211-231)Online publication date: 9-Sep-2020
  • (2019)Runtime Hardware Security Verification Using Approximate Computing: A Case Study on Video Motion Detection2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)10.1109/AsianHOST47458.2019.9006675(1-6)Online publication date: Dec-2019
  • (2019)A systematic review of crime facilitated by the consumer Internet of ThingsSecurity Journal10.1057/s41284-019-00211-8Online publication date: 15-Oct-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media