Published December 16, 2022 | Version v1
Journal article Open

MODELS AND ALGORITHMS FOR PROTECTION AGAINST THREATS THAT VIOLATE THE INTEGRITY OF VIDEO INFORMATION

Description

Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user’s privacy. In this review, we explore the attack surface of modern surveillance systems and enumerate the various ways they can be compromised with real examples. We also identify the threat agents, their attack goals, attack vectors, and the resulting consequences of successful attacks. Finally, we present current countermeasures and best practices and discuss the threat horizon. The purpose of this review is to provide researchers and engineers with a better understanding of a modern surveillance systems’ security, to harden existing systems and develop improved security solutions.

Notes

"Science and innovation" international scientific journal. ISSN: 2181-3337

Files

A-150.pdf

Files (800.7 kB)

Name Size Download all
md5:676935630b3fada560d9a746426b31ea
800.7 kB Preview Download