Attacks and Preventive Measures on Video Surveillance Systems: a Review
Total Page:16
File Type:pdf, Size:1020Kb
applied sciences Review Attacks and Preventive Measures on Video Surveillance Systems: A Review Preethi Vennam 1 , Pramod T. C. 2, Thippeswamy B. M. 3, Yong-Guk Kim 4,* and Pavan Kumar B. N. 4,* 1 Department of Computer Science & Engineering, Dayananda Sagar University, Bengaluru 560078, India; [email protected] 2 Department of Computer Science & Engineering, Siddaganga Institute of Technology, Tumakuru 572103, India; [email protected] 3 Department of Computer Science & Engineering, Adama Science & Technology University, Adama 1888, Ethiopia; [email protected] 4 Department of Computer Engineering, Sejong University, Seoul 05000, Korea * Correspondence: [email protected] (Y.-G.K.); [email protected] (P.K.B.N.) Abstract: Video surveillance systems are widely deployed with large systems for use in strategic places such as home security, public transportation, banks, ATM centers, city centers, airports, and public roads, and play a vital role in protecting critical infrastructures. As various attacks are possible in these systems, identifying attacks and considering suitable security measures are essential. In this paper, we present a detailed review of existing and possible threats in video surveillance, CCTV, and IP-camera systems. This provides insight for the better identification of the security risks associated with the design and deployment of these systems and promotes further research in this emerging field. We also present countermeasures to prevent and protect the surveillance systems from various security attacks. Citation: Vennam, P.; T. C., P.; Keywords: video surveillance system (VSS); closed-circuit television cameras (CCTV); Internet of B. M., T.; Kim, Y.-G.; B. N., P.K. Things (IoT); security attacks Attacks and Preventive Measures on Video Surveillance Systems: A Review. Appl. Sci. 2021, 11, 5571. https://doi.org/10.3390/app11125571 1. Introduction Academic Editors: Juan Francisco De Surveillance systems have become more and more popular in recent times. Govern- Paz Santana and Gianluigi Ferrari ment and private organizations, residential societies, and commercial and public spaces, are using these systems to keep a check on various activities for security and safety pur- Received: 10 February 2021 poses. In French, the word “sur” means “from above” and “veiller” means “to watch”. Accepted: 10 June 2021 Surveillance means monitoring movements, activities and behavior in order to manage, Published: 16 June 2021 control, and protect people. Surveillance systems have the advantage of remote and contin- uous monitoring. To view events as they occur and to monitor activities in any area at a Publisher’s Note: MDPI stays neutral later time, closed-circuit television systems (CCTV) technology is being used. Increasing with regard to jurisdictional claims in thefts and criminal activities demand the usage of CCTV cameras in both commercial published maps and institutional affil- and residential sectors for security purposes. CCTV cameras are available in different iations. forms: non-IP (Internet Protocol), IP CCTV cameras and wireless CCTV cameras. Due to the features of technology, flexibility, ease of use, and affordability, the usage of IP-based wireless CCTV cameras is becoming a trend in the present scenario. As it is being used in many applications all over the world, the market for CCTV is widely expanding. Figure1 Copyright: © 2021 by the authors. shows the forecast of the wired and wireless cameras market in the coming years. The size Licensee MDPI, Basel, Switzerland. of the security camera market was valued at USD 3.71 billion in 2019 and is expected to This article is an open access article grow at a compound annual growth rate (CAGR) of 15.7% from 2020 to 2027 [1]. distributed under the terms and The virtue of IoT is that it gives new look for the upcoming video surveillance systems. conditions of the Creative Commons Instead of capturing footage and visualizing it later in order to detect theft, violence or Attribution (CC BY) license (https:// vandalism, there is a need for cameras to self-detect the abnormal events and interpret creativecommons.org/licenses/by/ the same to other systems for necessary actions. To cater to this, cameras are becoming 4.0/). Appl. Sci. 2021, 11, 5571. https://doi.org/10.3390/app11125571 https://www.mdpi.com/journal/applsci Appl. Sci. 2021, 11, x FOR PEER REVIEW 2 of 16 Appl. Sci. 2021, 11, 5571 2 of 17 smart, with the integration of the latest technologies. The smart cameras have exploited the benefits of computer vision, machine learning and automation. IoT helps to connect Appl. Sci. 2021, 11, x FOR PEER REVIEWnetwork-enabled cameras with other devices and systems and thus transforms secure2 of 16 surveillance into smart security surveillance systems. Figure 1. Security camera market size. The virtue of IoT is that it gives new look for the upcoming video surveillance systems. Instead of capturing footage and visualizing it later in order to detect theft, violence or vandalism, there is a need for cameras to self-detect the abnormal events and interpret the same to other systems for necessary actions. To cater to this, cameras are becoming smart, with the integration of the latest technologies. The smart cameras have exploited the benefits of computer vision, machine learning and automation. IoT helps to connect network-enabled cameras with other devices and systems and thus transforms FiguresecureFigure 1. 1.surveillanceSecurity Security camera camera into market marketsmart size. securitysize. surveillance systems. Overview of VSS: Video surveillance systems are widely used in cyber-systems such as healthcare,OverviewThe virtue oftraffic of VSS: IoT analysis, Video is that surveillance wildlifeit gives monew systemsnitoring, look are for environmenta widely the upcoming used inl monitoring, cyber-systems video surveillance weather such asforecastingsystems. healthcare, Instead and traffic public of analysis,capturing safety. wildlifeIn footage VSS, monitoring,security and visualizing cameras environmental areit later available in monitoring,order in a towide detect weatherrange theft, of forecastingstylesviolence and or features. andvandalism, public A wireless safety. there is InVSS a VSS,need source securityfor canodemeras cameras consists to self-detect areof cameras, available the aabnormal intransceiver, a wide events range storage and of stylesunit,interpret andmicroprocessor the features. same Ato wireless andother power systems VSS supply. source for necessa nodeEach consistsnodery actions. performs of cameras, To catervideo a transceiver,to compression, this, cameras storage data are unit,transmissionbecoming microprocessor smart, and withvideo and the capturing power integration supply. as the of basic the Each latest function. node technologies. performs The data video processingThe smart compression, camerasunit and data havedata transmissiontransmissionexploited the and unitbenefits video at each of capturing computer wireless as vision,node the basic pr machineocess function. a learninglarge The amount data and processing automation. of video unit data IoT and withouthelps data to transmissiondegradingconnect network-enabled information unit at each and wirelesscameras security, nodewith processwhichother devices is a largea mostand amount systemschallenging of videoand thustask data transformsin without video degradingsurveillancesecure surveillance information applications into and smart [2]. security, The security general which surveillance architecture is a most challenging systems. of a functional task in VSS video is illustrated surveillance in applications [2]. The general architecture of a functional VSS is illustrated in Figure2. FigureOverview 2. of VSS: Video surveillance systems are widely used in cyber-systems such as healthcare, traffic analysis, wildlife monitoring, environmental monitoring, weather forecasting and public safety. In VSS, security cameras are available in a wide range of styles and features. A wireless VSS source node consists of cameras, a transceiver, storage unit, microprocessor and power supply. Each node performs video compression, data transmission and video capturing as the basic function. The data processing unit and data transmission unit at each wireless node process a large amount of video data without degrading information and security, which is a most challenging task in video surveillance applications [2]. The general architecture of a functional VSS is illustrated in Figure 2. FigureFigure 2. 2.Overview Overview ofof videovideo surveillancesurveillance system. system. MotivationMotivation andand OurOur Contribution Contribution TheThe usageusage ofof VSSVSS isis ubiquitousubiquitous inin today’s today’s scenario. scenario. AsAs thesethese systemssystems areare moremore beneficialbeneficial andand availableavailable atat affordableaffordable cost,cost, theythey areare widelywidely utilizedutilized toto protect protect the the public public andand private private network network systems. systems. Attackers Attackers are are continuously continuously targeting targeting these these systems systems with newwith attacksnew attacks and vulnerabilities. and vulnerabilities. When weWhen use anwe internet-connected use an internet-connected camera from camera a computer from a or smartphone, there is a chance that someone else can access it. That person can be a computer or smartphone, there is a chance that someone else can access it. That person “hacker” or an application to which we may have