ABSTRACT
Video traffic can create significant privacy and security threats to an organization or a smart home. Integration of IoT cameras has increased this problem manifold especially when there is no clear distinction among the protocols that can be used in IoT cameras and traditional video streaming or sharing applications. In this paper, we initiate a study on distinguishing video traffic in IoT cameras from that in video conferencing or sharing applications. We have used three IoT cameras, four video conferencing applications and two video sharing platforms to collect network traffic at network and above layers. We found a number of protocols like Real-time Transport Protocol, QUIC protocol, UDT protocol and TLS protocols that are used for transferring video traffic in these applications. We found that the protocols that carry IoT camera traffic have significantly different characteristics compared to that in video conferencing and sharing applications, e.g., in terms of video codec.
Supplemental Material
- ESOMER. Smart camera market size and forecast. https://www.verifiedmarketresearch.com/product/global-smart-camera-market/, 2021.Google Scholar
- Inc Global Market Insights. Video conferencing market to exhibit 19% growth through 2026. https://www.globenewswire.com/, 2021.Google Scholar
- YIWU LEIXUN COMPANY. Enem bulb camera. https://www.amazon.in/Camera-Hidden-Security-Communication-Warranty/dp/B0848NQXRV, 2020.Google Scholar
- E. P. Freire, A. Ziviani, and R. M. Salles. Detecting skype flows in web traffic. In NOMS 2008 - 2008 IEEE Network Operations and Management Symposium, pages 89--96, 2008.Google ScholarCross Ref
- M M. Sha, T Manesh, and S. M. Abd Elatty. Forensic framework for skype communication. In Intelligent Systems Technologies and Applications, pages 197--211. Springer, 2016.Google Scholar
- Juan Wang, Shirong Hao, Ru Wen, Boxian Zhang, Liqiang Zhang, Hongxin Hu, and Rongxing Lu. Iot-praetor: Undesired behaviors detection for iot devices. IEEE Internet of Things Journal, 8(2):927--940, 2020.Google ScholarCross Ref
- D. Alharbi R.and Aspinall. An iot analysis framework: An investigation of iot smart cameras' vulnerabilities. 2018.Google Scholar
- Hugo Fonseca, Tiago Cruz, Paulo Sim oes, Edmundo Monteiro, José Silva, Pedro Gomes, and Nuno Centeio. A comparison of classification techniques for detection of voip traffic. In 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies, pages 117--122. IEEE, 2014.Google ScholarDigital Library
Index Terms
- Demystifying Video Traffic from IoT (Spy) Camera using Undecrypted Network Traffic
Recommendations
Simulation of Network Traffic Using Self-adaptation Scheme
ICCMS '09: Proceedings of the 2009 International Conference on Computer Modeling and SimulationAs communication networking becomes vital to people's digital life. Also, various communication protocols are evolved in e-Service for e-Business models. The main push factor behind this network evolution is the real time transfer of multimedia ...
On RTP filtering for network traffic reduction
MoMM '08: Proceedings of the 6th International Conference on Advances in Mobile Computing and MultimediaAt present RTP is the de facto protocol used for real time traffic in the Internet, typically running over UDP. Unless higher priority is given to RTP traffic, excessive jitter can be experienced rendering the respective packets useless at the receiver. ...
Comments