Don't wanna be here? Send us removal request.
Text
IOT in security & surveillance
Abstract: Security and surveillance has become a common facet of business. There are dangers in the world: some are personal dangers, others are dangers or risks associated with assets. While there has been much recent debate about the appropriate use and amount of surveillance, it is fair to say that some amount of security and surveillance is necessary in today’s world.
INTRODUCTION
Security and surveillance solutions include everything from the most simple home monitoring systems and burglar alarms, to high-definition, motion-detecting cameras and retina scanning security solutions. Various forms of connectivity – both fixed-line and wireless – enable a basic type of M2M security solutions. However, when data from the solutions are aggregated and analyzed to predict behavior or thwart crimes, and we are able to access these data on common platforms and devices – including mobile devices – we have entered the world of the Internet of Things (IoT).
In 2012 there were 28 million security and surveillance IoT device connections worldwide growing to 170 million in 2021 at a compound-annual-growth-rate of 22%. See Figure 1. These include device connections in homes and businesses. Today, quite a large percentage of security and surveillance systems – especially those in homes – are unconnected. We anticipate an increase over the next ten years of the percentage of these kind of home systems that are connected
WORKING
To function as intended, IoT devices need to be managed both internally, (e.g., software maintenance) and externally (i.e., their communication with other devices).
This is accomplished by connecting every IoT device to a management unit, known as a command and control (C&C) center. Centers are responsible for software maintenance, configurations, firmware updates to patch bugs and vulnerabilities, as well as the provisioning and authentication of tasks, such as device enrollment.
Communication between devices is enabled via application program interface (API). Once a device’s manufacturer exposes its API, other devices or applications can use it to gather data and communicate. Some APIs even allow control over devices. For example, a building manager can use an API to remotely lock doors inside a specific office.
C&C centers and APIs effectively manage day-to-day IoT operations. That said, their centralized nature creates a number of exploitable weak spots, including:
Unpatched vulnerabilities – Connectivity issues or the need for end-users to manually download updates directly from a C&C center often result in devices running on outdated software, leaving them open to newly discovered security vulnerabilities.
Weak authentication – Manufacturers often release IoT devices (e.g., home routers) containing easily decipherable passwords, which might be left in place by vendors and end-users. When left open to remote access, these devices become easy prey for attackers running automated scripts for bulk exploitation.
Vulnerable APIs – As a gateway to a C&C center, APIs are commonly targeted by a variety of threats, including Man in the Middle (MITM), code injections (e.g., SQLI), and distributed denial of service (DDoS) assaults. More information about the implications of API-targeting attacks can be found here.
Data Theft
An IoT device contains vast amounts of data, much of which is unique to its individual users, including online browsing/purchase records, credit card details and personal health information.
An improperly secured device leaves this data vulnerable to theft. What’s more, vulnerable devices can be used as gateways to other areas of the network they are deployed on, allowing for more sensitive data to be extracted.
Physical Harm
IoT devices are now commonplace in the medical industry, with examples including pacemakers, heart monitors and defibrillators. While convenient (e.g., a doctor can fine-tune a patient’s pacemaker remotely), these devices are also vulnerable to security threats.
An improperly secured device can be exploited to interfere with a patient’s medical care. It’s an exceedingly rare occurrence, albeit one to be considered when developing a strategy for securing IoT devices.
APPLICATIONS
The Opportunity - Smart Surveillance
Everyone is talking about the Iot, a trendy area of tech that is fairly new and growing exponentially. According to some estimates, the Internet of Things will connect 50 billion devices (not including PCs, smartphones and tablets) by 2020 – 250 of which will get connected every second. Also, the global economic value of IoT will reach $19 trillion by 2020. These figures have gotten everyone interested, including big players like IBM, which has recently invested $3 billion in its IoT division. So what is the significance for the video surveillance and security sector? The Internet of Things is likely to have a tremendous impact, as all types of organizations will look to connect their devices, enhance security and create ‘smart surveillance’ solutions.
Approach Reformulated With IoT
For many years, the focus within the video surveillance industry has been to connect most systems to Internet Protocol (IP) based networks. The next phase, Machine-to-Machine (M2M) as we call it, managed to create a connected device-based industry, and IP video surveillance systems perfectly integrated into that. Typical M2M successful examples would be GPS tracking solutions and remote asset (fixed or mobile) monitoring, to name a few. The result of these migrations was a huge amount of data that businesses had to manage.
With the recent improvements in mobile network (like LTE high speed connections), cloud technology and readily available fiber optics backbone, the Internet of Things (IoT) came into play. IoT brings a holistic approach to the table where connected systems and generated data are analyzed locally, or in the cloud, returning to decision makers the information they need, when they need it and in a fully customisable and easy-to-read interface.
Applications – IoT In Mining Industry
For example, in the mining industry, the technology can optimize operations and reduce risk. It can be used to monitor operations and videos, estimate the traffic going underground in the mines, and help with sub-systems management. Advanced video surveillance solutions, powered by the Internet of Things, can be used to read sensors and integrate with them. Thus, IoT can provide an array of connected sensors to businesses, which will help reduce the points of failure. With the deployment of IoT, 10-25% of operating costs can be reduced, like those associated with people and vehicle counting, and temperature and gas sensing.IoT can also help in the reduction of costs involved in the special care that has to be taken with monitoring and managing operations around inflammable gases. With smart surveillance and sensing systems, cameras can be programmed to trigger notifications. This can help businesses be better prepared and allocate resources strategically. Another direct application would be to help with managing the airflow in mines. There is also a risk of loss of lives, when it comes to mining operations, and this can be prevented with smart sensor systems. Connected sensing systems and smart video surveillance support with a predictive analytics component can help businesses predict hazards and take corrective actions in real time.
Smart Surveillance In Aviation Industry
Another industry that can benefit greatly from IoT is aviation. An airbus A380-1000, expected to be ready in 2020, will have 10,000 sensors per wing. An aircraft of this size is estimated to generate 8 Terabytes of data per day, which can be gathered and analyzed. Also, the aviation sector sees 35 million departures per year and, while there is surveillance data, nobody is analyzing these sensors. So, the opportunity in the aviation industry is huge. Security vulnerabilities are a major cause of concern for this industry, and this is where a smart video surveillance and sensory system can be helpful. By analyzing connected sensors and learning from the vast amounts of data generated, air travel can be made safer.
DISCUSSION
This survey intended to give an overview of the current trends in IoT security research. At the same time, this survey presented some attack vectors and challenges to IoT security. High quality papers from Web of Knowledge were reviewed and categorized into by their objectives, methods used in the research, and the simulation tools used in order to simulate or validate the results. It was found that other than the simulation tools and modeller, the availability of the platform to validate the security protocol will help in producing a novel IoT security protocol. Hence, there is no doubt that the rapid progress of research in IoT security is supported by the availability of simulation tools and IoT modellers. There have been real catastrophic events resulting from attackers using insecure devices as “thingbots” to attack the IoT network. This is strong evidence that the security of the IoT is of pressing concern. It is also assumed that the IoT will remain a target and attack vector for years to come. This is due to the increasing number of IoT devices, the heterogeneity of the protocols used in the IoT, and the minimal or default security measures embedded in the devices by the manufacturers. Clearly, cyber (IT) security, such as authentication, encryption, and firewalls, should be implemented as security measures in the IoT. But this is not sufficient. The interaction and integration between physical and cyber systems make the IoT different from the traditional network.
�� FUTURE SCOPE
Internet of Things (IoT) is an escalating trend in today's world, and has proved to be a game changer in the field of technology. More and more sensors and devices are being connected together to develop new systems to solve real world problems. With the increase in technology and automation, security has become a major concern. The first line of defense for any property is always a security system, which alerts the owners regarding intrusion in real time. Currently, there exist multiple security systems, which make use of various motion sensors to detect any motion and notify the owner about the intrusion. However, most of these systems do not provide the features of zone barriers, facial recognition, remote camera surveillance and power failure detection, combined with ease of use, economic viability and power efficiency. The main objective of the proposed architecture is to overcome all these problems by developing a smart security and surveillance system which makes use of multiple ultrasonic sensors to detect intrusion attempts on the property of the owner, in order to notify them of the presence of an unauthorized person. Also, the system provides a warning to the person who has intentionally or unintentionally entered the property, so that they can step back in time, without triggering any alarm. With the help of a remote camera surveillance feature, the owner can monitor the surroundings of their property remotely. This system will issue an alert to the owner in case of a power failure as well. This system provides face recognition as an authentication procedure, in order to allow the valid entrants to enter into their property. All these features combined, create a flexible and reliable security system, which can be used in various properties, such as homes, offices, museums and so on.
CONCLUSION
By harnessing the power of IoT for your security and surveillance solutions, you enable building owners, organization managers, and security professionals to:
Manage and control surveillance devices remotely to monitor all aspects of a facility.
Make smarter decisions about the best course of action to take based on real-time security conditions.
Determine when there is a false alarm without having to physically inspect the location or unnecessarily dispatch law enforcement.
Collect and analyze data to make important improvements to security processes and systems.
Perhaps the greatest benefit of using IoT solutions for your security system is the ability to prevent the loss of critical assets. IoT security solutions allow organizations to
Gain greater visibility over who enters and leaves a facility in real-time.
Consistently and securely monitor facility conditions from any location with Wi-Fi access.
Act quickly on important security alerts delivered right to their mobile device.
IoT makes it possible to gain greater visibility over your assets to improve security and prevent critical loss through real-time surveillance. Telit enables integrated wireless IoT security and surveillance solutions for security service providers, building owners, public organizations, and cities that want to build effective and secure security systems.
Author:
Jai Vardhan Singh Rathore, Anjali kale, Prathmesh Jadhav, Vaishnavi Jadhav
5 notes
·
View notes