| Literature DB >> 34203289 |
Hao Li1, Tianhao Xiezhang2,3, Cheng Yang2,3, Lianbing Deng1, Peng Yi4.
Abstract
In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention. At present, many researchers focus on how to select the region of interest (RoI) accurately and then realize privacy protection in videos by selective encryption. However, relatively few researchers focus on building a security framework by analyzing the security of a video surveillance system from the system and data life cycle. By analyzing the surveillance video protection and the attack surface of a video surveillance system in a smart city, we constructed a secure surveillance framework in this manuscript. In the secure framework, a secure video surveillance model is proposed, and a secure authentication protocol that can resist man-in-the-middle attacks (MITM) and replay attacks is implemented. For the management of the video encryption key, we introduced the Chinese remainder theorem (CRT) on the basis of group key management to provide an efficient and secure key update. In addition, we built a decryption suite based on transparent encryption to ensure the security of the decryption environment. The security analysis proved that our system can guarantee the forward and backward security of the key update. In the experiment environment, the average decryption speed of our system can reach 91.47 Mb/s, which can meet the real-time requirement of practical applications.Entities:
Keywords: decryption security; key management; real-time performance; secure video surveillance
Mesh:
Year: 2021 PMID: 34203289 PMCID: PMC8271794 DOI: 10.3390/s21134419
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Group key update scheme-based LKH.
Figure 2Secure video surveillance model in smart city.
Figure 3Hierarchical key management architecture.
Figure 4Encryption and decryption process.
Prefix format.
| Name | Size (Byte) | Meaning |
|---|---|---|
| encFlag | 4 | If the file is encrypted |
| PSize | 4 | Size of file prefix |
| Digest | 32 | Digest of cipher data |
| Padding | - | Prefix padding |
File filtering process.
| Pseudocode 1: Pre-Operation | Pseudocode 2: Post-Operation |
|---|---|
… … | … … |
Figure 5Speed of transparent decryption.
Decryption speed comparison.
| Schemes | [ | [ | [ | [ | Proposed Scheme | ||
|---|---|---|---|---|---|---|---|
| Multimedia type | Image | Video | All | ||||
| Encryption algorithm | Chaos-based | AES | RC6 | DES | All | ||
| Speed (Mb/s) | 0.45 | 1.85 | 1.87 | 17.89 | 8.94 | 3.59 |
|