Abstract
This paper proposes a low-cost solution to develop IoT security cameras. Integrity and confidentiality of the image data are achieved by cryptographic modules that implement symmetric key-based techniques which are usually available in the hardware of the IoT cameras. The novelty of this proposal is that the secret key required is not stored but reconstructed from the start-up values of a SRAM in the camera hardware acting as a PUF (Physical Unclonable Function), so that the physical authenticity of the camera is also ensured. The start-up values of the SRAM are also exploited to change the IV (Initialization Vector) in the encryption algorithm. All the steps for enrollment and normal operation can be included in a simple firmware to be executed by the camera. There is no need to include specific hardware but only a SRAM is needed which could be powered down and up by firmware.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. IEEE Comput. 50(7), 80–84 (2017)
Chen, S., Pande, A., Mohapatra, P.: Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications and Services, pp. 109–122 (2014)
Li, C.-T.: Multimedia Forensics and Security. Information Science Reference, Hershey (2009)
Lian, S.: Multimedia Content Encryption: Techniques and Applications. CRC Press, Boca Raton (2008)
Winkler, T., Rinner, B.: Privacy and security in video surveillance. In: Atrey, P., Kankanhalli, M., Cavallaro, A. (eds.) Intelligent Multimedia Surveillance: Current Trends and Research, pp. 37–66. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41512-8_3
Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)
Sanlyde, D., Skorobogatov, S., Anderson, R., Quisquater, J.-J.: On a new way to read data from memory. In: Proceedings of the First International IEEE Security in Storage Workshop, pp. 65–69 (2002)
Choi, P., Kim, D.K.: Design of security enhanced TPM chip against invasive physical attacks. In: IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1787–1790 (2012)
Herder, C., Yu, M.-D., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014)
Shokrollahi, J., Martin, C.: Method for Authenticating a Charge-Coupled Device (CCD). Patent No. 8817123 (2014)
Cao, Y., Zhang, L., Zalivaka, S.S., Chang, C.-H., Chen, S.: CMOS image sensor based physical unclonable function for coherent sensor-level authentication. IEEE Trans. Circ. Syst. I Regul. Pap. 62(11), 2629–2640 (2015)
Haider, I., Höberl, M. Rinner, B.: Trusted sensors for participatory sensing and IoT applications based on physically unclonable functions. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS), pp. 14–21 (2016)
Prada-Delgado, M.A., Vázquez-Reyes, A., Baturone, I.: Trustworthy firmware update for Internet-of-Thing devices using physical unclonable functions. In: Global IoT Summit, (2017)
Massoudi, A., Lefebvre, F., De Vleeschouwer, C., Macq, B., Quisquater, J.-J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Inf. Secur. 2008, 1–18 (2008)
Jeon, Y., Kim, Y., Kim, J.: Implementation of a video streaming security system for smart device. In: IEEE International Conference on Consumer Electronics (ICCE), pp. 97–100 (2014)
National Institute of Standards and Technology: Recommendations for Block Cipher Modes of Operation. NIST Special Publication 800-38A (2001)
Souyah, A., Faraoun, K.M.: A review on different image encryption approaches. In: Chikhi, S., Amine, A., Chaoui, A., Kholladi, M.K., Saidouni, D.E. (eds.) Modelling and Implementation of Complex Systems. LNNS, vol. 1, pp. 3–18. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33410-3_1
Caragata, D., Mucarquer, J.A., Koscina, M., El Assad, S.: Cryptanalysis of an improved fragile watermarking scheme. AEU Int. J. Electron. Commun. 70(6), 777–785 (2016)
Baturone, I., Prada-Delgado, M.A., Eiroa, S.: Improved generation of identifiers, secret keys, and random numbers from SRAMs. IEEE Trans. Inf. Forensics Secur. 10(12), 2653–2668 (2015)
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)
Prada-Delgado, M.A., Vázquez-Reyes, A., Baturone, I.: Physical unclonable keys for smart lock systems using bluetooth low energy. In: 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON), pp. 4808–4813 (2016)
Acknowledgments
This work was supported in part by TEC2014-57971-R project from Ministerio de Economía y Competitividad of the Spanish Government (with support from the PO FEDER-FSE) and 201750E010 (HW-SEEDS) project from CSIC. The work of Miguel A. Prada-Delgado was supported by V Plan Propio de Investigación through the University of Seville, Seville, Spain.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Arjona, R., Prada-Delgado, M.A., Arcenegui, J., Baturone, I. (2018). Using Physical Unclonable Functions for Internet-of-Thing Security Cameras. In: Fortino, G., et al. Interoperability, Safety and Security in IoT. InterIoT SaSeIoT 2017 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242. Springer, Cham. https://doi.org/10.1007/978-3-319-93797-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-93797-7_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93796-0
Online ISBN: 978-3-319-93797-7
eBook Packages: Computer ScienceComputer Science (R0)