바로가기메뉴
메뉴바로가기
본문바로가기

연구성과

  • 국외저널
  • 국내저널
  • 특허
  • 학술발표
  • SW
  • 기술이전
  • 표준화활동
  • 기술홍보
  • 연구자별 성과검색

연구성과

NUI/NUX 플랫폼 연구센터의 연구성과 입니다.

more

국제협력

NUI/NUX 플랫폼 연구센터의 연구성과 입니다.

more

산합협력

NUI/NUX 플랫폼 연구센터의 산학협력 현황 입니다.

more

갤러리

NUI/NUX 플랫폼 연구센터의 활동사진 입니다.

more

home > 연구성과 > 국외저널

사용후기
책임교수 박종혁
논문명 Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key
논문종류 SCI
제1저자 Jungho Kang
교신저자 Jong Hyuk Park
공동저자 Jaekyung Han
Impact Factor 0.826
개제학술지명 Symmetry
Keyword IP camer, access control management, hierarchical group-key, authentication, protocol
게재일 2015 년 08 월
Abstract: Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.
OPEN ACCESS