iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-030-63095-9_20
Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System | SpringerLink
Skip to main content

Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2020)

Abstract

Home IP cameras are consistently among the most popular smart home devices and recent news stories about home IP cameras getting hacked frequently have posed serious security and privacy concerns for consumers. In this paper, we propose Ucam, a user-centric, blockchain-based and end-to-end secure home IP camera system. Ucam leverages advanced technologies such as blockchain, end-to-end encryption and trusted computing to address a number of vulnerabilities in the existing solutions. In the Ucam design, we replace traditional username/password based login approach with a one-click, blockchain-based passwordless counterpart and apply the resurrecting duckling security model to secure device binding. In particular, we utilize blockchain extensively to manage device ownership and provide integrity protection for the video clips stored locally or remotely. For coping with privacy, the end-to-end encryption, which is coupled with a user-centric, secure element enhanced key management scheme, is implemented in Ucam. Finally, Ucam employs re-encryption with Intel SGX as well as key refreshing to enable the sharing of encrypted video clips and live streaming videos, respectively. The security analysis and performance evaluation demonstrate that Ucam is able to meet the increasing security and privacy requirements for home IP camera systems with negligible performance overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Avast Security News Team, "What is credential stuffing, and why is my smart security camera vulnerable to it?". https://blog.avast.com/credential-stuffing-and-web-cams, Security News, 4 May 2019

  2. Chen, L.: Recommendation for Key Derivation Using Pseudorandom Functions (Revised), NIST Special Publication 800–108, October 2009

    Google Scholar 

  3. Chen, J., Sun, M., Zhang, K.: Security analysis of device binding for IP-based IoT devices. In: Proceedings of 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), IEEE Computer Society, pp. 900–905 (2019)

    Google Scholar 

  4. Costan, V., Devadas, S.: “Intel SGX Explained", IACR Cryptology ePrint Archive, Report 2016/86 (2016)

    Google Scholar 

  5. Dworkin, M.: “Recommendation for Block Cipher Modes of Operation: Methods and Techniques", National Institute of Standards and Technology, NIST Special Publication 800–38A, December 2001

    Google Scholar 

  6. eufy Security Indoor Cam 2K Pan & Tilt. https://www.eufylife.com/products/variant/eufycam-2/T8410121

  7. Haicam End-to-End Encrypted Home Security Camera. https://haicam.tech/

  8. Isidore, C.: Smart camera maker Wyze hit with customer data breach. https://www.cnn.com/2019/12/30/tech/wyze-data-breach/index.html, CNN Business, 30 December 2019

  9. ISO/IEC 7816–4:2013, Identification cards - Integrated circuit cards - Part 4: Organization, security and commands for interchange

    Google Scholar 

  10. McInnis, K.: Consumer Reports letter to connected camera manufacturers to call for raising security and privacy standards. https://advocacy.consumerreports.org/research/consumer-reports-letter-to-connected-camera-manufacturers-to-call-for-raising-security-and-privacy-standards/, Consumer Reports, 13 January 2020

  11. McKeen, F., et al.: Innovative instructions and software model for isolated execution. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP 2013), p. 10. ACM Press (2013)

    Google Scholar 

  12. Merkle, Ralph C.: A digital signature based on a conventional encryption function. In: Pomerance, Carl (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988). https://doi.org/10.1007/3-540-48184-2_32

    Chapter  Google Scholar 

  13. Nest Cam Indoor. https://store.google.com/us/product/nest_cam

  14. NXP Semiconductors. EdgeLockTM SE050 Development Kit

    Google Scholar 

  15. Ring Indoor Cam. https://shop.ring.com/products/mini-indoor-security-camera?variant=30258040832089

  16. Standards for Efficient Cryptography. “SEC 2: Recommended Elliptic Curve Domain Parameters, Version 2.0", Certicom Research (2010)

    Google Scholar 

  17. Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ubiquitous computing. Computer 35, 22–26 (2002). IEEE Computer Society

    Article  Google Scholar 

  18. Sundby, A.: Hacker spoke to baby, hurled obscenities at couple using Nest camera, dad says. https://www.cbsnews.com/news/nest-camera-hacked-hacker-spoke-to-baby-hurled-obscenities-at-couple-using-nest-camera-dad-says/, CBS News, 31 January 2019

  19. Szabo, N.: Smart Contracts: Building Blocks for Digital Markets (1996). http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html

  20. Thomas, K., Moscicki, A.: New research: how effective is basic account hygiene at preventing hijacking, Google Security Blog, 17 May 2019

    Google Scholar 

  21. Vigdor, N.: Somebody’s Watching: Hackers Breach Ring Home Security Cameras. https://www.nytimes.com/2019/12/15/us/Hacked-ring-home-security-cameras.html, The New York Times, 15 December 2019

  22. Wyze Cam V2. https://wyze.com/wyze-cam.html

  23. Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain Technology Overview, National Institute of Standards and Technology, Draft NISTIR 8202, January 2018

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinxin Fan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fan, X., Zhong, Z., Chai, Q., Guo, D. (2020). Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System. In: Park, N., Sun, K., Foresti, S., Butler, K., Saxena, N. (eds) Security and Privacy in Communication Networks. SecureComm 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 336. Springer, Cham. https://doi.org/10.1007/978-3-030-63095-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63095-9_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63094-2

  • Online ISBN: 978-3-030-63095-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics