Research Article
BibTex RIS Cite

Video or Image Transmission Security for ESP-EYE IoT device used in Business Processes

Year 2021, Volume: 7 Issue: 1, 1 - 9, 07.07.2021

Abstract

Nesnelerin İnterneti, RFID etiketleri, sensörler, internete bağlanma özelliğine sahip bazı hafif geliştirme platformları gibi fiziksel nesnelerin oluşturduğu bir iletişim ağının adıdır. Bu ağda cihazlar kendi aralarında haberleşebilirken, aynı zamanda büyük bir ağın parçası olabilirler. Nesnelerin interneti ağının üyesi olan bu fiziksel nesnelerin ürettiği veriler farklı yöntemlerle işlenir ve elde edilen çıktılar karar verme ve öğrenme gibi süreçlerde kullanılır. Nesnelerin İnternetinin bu yönü ile insan hayatının her alanını etkilemekte ve sayısı her geçen gün artmaktadır. Bu cihazlar, sınırlı kaynakları, geniş kullanım alanları ve eksik güvenlik standartları nedeniyle güvenlik açıklarına sahiptirler. İnsanların yaşam alanlarında, imalat ve iş süreçlerinde kullanılan bu cihazlar, mahremiyetin korunmasında da zorluklara neden oluyor. Bu çalışmada ESP-Eye adı verilen Nesnelerin İnterneti cihazında haberleşme güvenliği için kamera, kablosuz iletişim modülü ve yüz tanıma yazılımı içeren bir çözüm geliştirilmiştir. Önerilen çözüm ESP-Eye'da uygulanmıştır.

Thanks

Thank you to Assoc. Prof. Dr. Gökhan DALKILIÇ and Dokuz Eylül University Computer Engineering Department for their support in the creation of this study.

References

  • Alias, C.; Özgür, C.; Yang, Q.; Noche, B. (2015): A System of Multi-Sensor Fusion for Activity Monitoring of Industrial Trucks in Logistics Warehouses. In: ASME 2015 International Design Engineering Technical Conferences & 35th Computers and Information in Engineering Conference. Boston (MA), U.S.A., 02-05 August.
  • Alias, C., Özgür, Ç., & Noche, B. (2016). Monitoring production and logistics processes with the help of industrial image processing. In 27th Annual POMS Conference (pp. 2280-2292).
  • Almasalha, F., Hasimoto-Beltran, R., & Khokhar, A. (2014). Partial Encryption of Entropy-Coded Video Compression Using Coupled Chaotic Maps. Entropy, 16(10), 5575-5600.
  • Apthorpe, N., Reisman, D., & Feamster, N. (2017). A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv preprint arXiv:1705.06805.
  • Aydın, Ö. (2020). Elektrikli Kara Araçları İçin Doğrulama Protokollü Güvenli Şarj ve Ödeme Sistemi. 4th International Congress On Economics Finance and Energy. Niğde, Turkey. 14-15 October 2020.
  • Aydin, Ö., Dalkiliç, G., & Kösemen, C. (2020). A novel grouping proof authentication protocol for lightweight devices: GPAPXR+. Turkish Journal of Electrical Engineering & Computer Sciences, 28(5), 3036-3051.
  • Baumgrass, A., Di Ciccio, C., Dijkman, R.M., Hewelt, M., Mendling, J., Meyer, A., Pourmirza, S., Weske, M., Wong, T.Y.: GET Controller and UNICORN: event-driven process execution and monitoring in logistics. In: BPM Demo Session, pp. 75–79 (2015).
  • BehrTech (2021). How to Level Up Quality Control in Manufacturing with IoT. BehrTech Blog. https://behrtech.com/blog/how-to-level-up-quality-control-in-manufacturing-with-iot/ (accessed date :20.02.2021).
  • Çepik, H., Aydın, Ö., Dalkılıç, G. (2020). Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. 7th International Management Information Systems Conference. İzmir Turkey. 9-11 December 2020.
  • Çepik, H., Aydın, Ö., Dalkılıç, G. (2021). Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. In Multidisciplinary Digital Publishing Institute Proceedings, 74(1), pp 1-10.
  • Duncan, B., Happe, A., & Bratterud, A. (2016, December). Enterprise IoT security and scalability: how unikernels can improve the status Quo. In 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) (pp. 292-297). IEEE.
  • ESP32-CAM Module. (2017) https://loboris.eu/ESP32/ESP32-CAM%20Product%20Specification.pdf, (accessed date :09.01.2021) Friedow C., Völker M., Hewelt M. (2018) Integrating IoT Devices into Business Processes. In: Matulevičius R., Dijkman R. (eds) Advanced Information Systems Engineering Workshops. CAiSE 2018. Lecture Notes in Business Information Processing, vol 316. Springer, Cham. https://doi.org/10.1007/978-3-319-92898-2_22 Giusto, D., Iera, A., Morabito, G., & Atzori, L. (Eds.). (2010). The internet of things: 20th Tyrrhenian workshop on digital communications. Springer Science & Business Media.
  • Hamoudy, M. A., Qutqut, M. H., & Almasalha, F. (2017). Video security in Internet of things: an overview. IJCSNS, 17(8), 199.
  • Herzberg, N., Meyer, A., Weske, M.: An event processing platform for business process management. In: EDOC. IEEE (2013) Kokoulin, A. N., Tur, A. I., Yuzhakov, A. A., & Knyazev, A. I. (2019, January). Hierarchical Convolutional Neural Network Architecture in Distributed Facial Recognition System. In 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (pp. 258-262). IEEE.
  • Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80-84. Lei, J., Fu, X., Juchem, I., & Hogrefe, D. (2005). Architectural thoughts and requirements considerations on video streaming over the Internet. Technical Report No. IFI-TB-2005-06.
  • Malić, M., Dobrilović, D., & Petrov, I. (2016). Example of IoT platform usage for wireless video surveillance with support of NoSQL and cloud systems. Proceedings of the ICAIIT2016, 27-34.
  • Mandal, S., Hewelt, M., Weske, M.: A Framework for Integrating Real-World Events and Business Processes in an IoT Environment. In: Panetto, H., et al. (eds.) On the Move to Meaningful Internet Systems. OTM 2017 Conferences, OTM 2017. LNCS, vol. 10573, pp. 194–212. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69462-7_13
  • Meyer, S., Ruppen, A., Magerkurth, C.: Internet of Things-aware process modeling: integrating iot devices as business process resources. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 84–98. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38709-8_6
  • Özgür, C.; Alias, C.; Noche, B. (2015): Comparing sensor-based and camera-based approaches to recognizing the occupancy status of the load handling device of forklift trucks. In: Noche, Bernd (ed.) (2015): Tagungsband zum 11. Fachkolloquium der Wissenschaftlichen Gesellschaft für Technische Logistik e.V.. Duisburg, Germany, 30 September - 01 October 2015. Scientific Society of Logistics Engineering, pp. 73–81.
  • Raghavendra M, Bharath AM, Dhananjaya V, Bharath, Nithyanandhan S. IoT Based Thermal Surveillance and Security System (May 13, 2019). Available at SSRN. http://dx.doi.org/10.2139/ssrn.3387538.
  • Random Nerd Tutorials, ESP32-CAM-FTDI-programmer, https://i0.wp.com/randomnerdtutorials.com/wp-content/uploads/2019/08/ESP32-CAM-FTDI-programmer-5V-supply.png?w=813&ssl=1, (accessed date :09.01.2021)
  • Rawlings, K. (2019). How IoT Technology is Revolutionizing the Retail Industry. TotalReatil. https://www.mytotalretail.com/article/how-iot-technology-is-revolutionizing-the-retail-industry/ (accessed date:20.02.2021)
  • Ringe, A., Dalavi, M., Kabugade, S., & Mane, P. (2019). IoT based smart refrigerator using Raspberry Pi. International Journal of Research and Analytical Reviews, 154-158.
  • Sammoud, A., Kumar, A., Bayoumi, M., & Elarabi, T. (2017, May). Real-time streaming challenges in Internet of Video Things (IoVT). In 2017 IEEE International Symposium on Circuits and Systems (ISCAS) (pp. 1-4). IEEE.
  • Seralathan, Y., Oh, T. T., Jadhav, S., Myers, J., Jeong, J. P., Kim, Y. H., & Kim, J. N. (2018, February). IoT security vulnerability: A case study of a Web camera. In 2018 20th International Conference on Advanced Communication Technology (ICACT) (pp. 172-177). IEEE.
  • Testo (2021). Kalite kontrol ve güvence. Testo: Be sure. https://www.testo.com/tr-TR/uygulamalar/uretim-kalite-kontrol, (accessed date:20.02.2021)
  • The Manufacturer (2018). Applications of IoT in Manufacturing Plants. https://www.themanufacturer.com/articles/applications-iot-manufacturing-plants/, (accessed date:20.02.2021)
  • Wee, S. J., & Apostolopoulos, J. G. (2001, May). Secure scalable video streaming for wireless networks. In IEEE International Conference On Acoustics Speech and Signal Processing (Vol. 4, pp. IV-2049). IEEE; 1999.

İş Süreçlerinde kullanılan ESP-EYE IoT cihazı için Video veya Görüntü İletim Güvenliği

Year 2021, Volume: 7 Issue: 1, 1 - 9, 07.07.2021

Abstract

Nesnelerin İnterneti, RFID etiketleri, sensörler, internete bağlanma özelliğine sahip bazı hafif geliştirme platformları gibi fiziksel nesnelerin oluşturduğu bir iletişim ağının adıdır. Bu ağda cihazlar kendi aralarında haberleşebilirken, aynı zamanda büyük bir ağın parçası olabilirler. Nesnelerin interneti ağının üyesi olan bu fiziksel nesnelerin ürettiği veriler farklı yöntemlerle işlenir ve elde edilen çıktılar karar verme ve öğrenme gibi süreçlerde kullanılır. Nesnelerin İnternetinin bu yönü ile insan hayatının her alanını etkilemekte ve sayısı her geçen gün artmaktadır. Bu cihazlar, sınırlı kaynakları, geniş kullanım alanları ve eksik güvenlik standartları nedeniyle güvenlik açıklarına sahiptirler. İnsanların yaşam alanlarında, imalat ve iş süreçlerinde kullanılan bu cihazlar, mahremiyetin korunmasında da zorluklara neden oluyor. Bu çalışmada ESP-Eye adı verilen Nesnelerin İnterneti cihazında haberleşme güvenliği için kamera, kablosuz iletişim modülü ve yüz tanıma yazılımı içeren bir çözüm geliştirilmiştir. Önerilen çözüm ESP-Eye'da uygulanmıştır.

References

  • Alias, C.; Özgür, C.; Yang, Q.; Noche, B. (2015): A System of Multi-Sensor Fusion for Activity Monitoring of Industrial Trucks in Logistics Warehouses. In: ASME 2015 International Design Engineering Technical Conferences & 35th Computers and Information in Engineering Conference. Boston (MA), U.S.A., 02-05 August.
  • Alias, C., Özgür, Ç., & Noche, B. (2016). Monitoring production and logistics processes with the help of industrial image processing. In 27th Annual POMS Conference (pp. 2280-2292).
  • Almasalha, F., Hasimoto-Beltran, R., & Khokhar, A. (2014). Partial Encryption of Entropy-Coded Video Compression Using Coupled Chaotic Maps. Entropy, 16(10), 5575-5600.
  • Apthorpe, N., Reisman, D., & Feamster, N. (2017). A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv preprint arXiv:1705.06805.
  • Aydın, Ö. (2020). Elektrikli Kara Araçları İçin Doğrulama Protokollü Güvenli Şarj ve Ödeme Sistemi. 4th International Congress On Economics Finance and Energy. Niğde, Turkey. 14-15 October 2020.
  • Aydin, Ö., Dalkiliç, G., & Kösemen, C. (2020). A novel grouping proof authentication protocol for lightweight devices: GPAPXR+. Turkish Journal of Electrical Engineering & Computer Sciences, 28(5), 3036-3051.
  • Baumgrass, A., Di Ciccio, C., Dijkman, R.M., Hewelt, M., Mendling, J., Meyer, A., Pourmirza, S., Weske, M., Wong, T.Y.: GET Controller and UNICORN: event-driven process execution and monitoring in logistics. In: BPM Demo Session, pp. 75–79 (2015).
  • BehrTech (2021). How to Level Up Quality Control in Manufacturing with IoT. BehrTech Blog. https://behrtech.com/blog/how-to-level-up-quality-control-in-manufacturing-with-iot/ (accessed date :20.02.2021).
  • Çepik, H., Aydın, Ö., Dalkılıç, G. (2020). Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. 7th International Management Information Systems Conference. İzmir Turkey. 9-11 December 2020.
  • Çepik, H., Aydın, Ö., Dalkılıç, G. (2021). Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. In Multidisciplinary Digital Publishing Institute Proceedings, 74(1), pp 1-10.
  • Duncan, B., Happe, A., & Bratterud, A. (2016, December). Enterprise IoT security and scalability: how unikernels can improve the status Quo. In 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) (pp. 292-297). IEEE.
  • ESP32-CAM Module. (2017) https://loboris.eu/ESP32/ESP32-CAM%20Product%20Specification.pdf, (accessed date :09.01.2021) Friedow C., Völker M., Hewelt M. (2018) Integrating IoT Devices into Business Processes. In: Matulevičius R., Dijkman R. (eds) Advanced Information Systems Engineering Workshops. CAiSE 2018. Lecture Notes in Business Information Processing, vol 316. Springer, Cham. https://doi.org/10.1007/978-3-319-92898-2_22 Giusto, D., Iera, A., Morabito, G., & Atzori, L. (Eds.). (2010). The internet of things: 20th Tyrrhenian workshop on digital communications. Springer Science & Business Media.
  • Hamoudy, M. A., Qutqut, M. H., & Almasalha, F. (2017). Video security in Internet of things: an overview. IJCSNS, 17(8), 199.
  • Herzberg, N., Meyer, A., Weske, M.: An event processing platform for business process management. In: EDOC. IEEE (2013) Kokoulin, A. N., Tur, A. I., Yuzhakov, A. A., & Knyazev, A. I. (2019, January). Hierarchical Convolutional Neural Network Architecture in Distributed Facial Recognition System. In 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (pp. 258-262). IEEE.
  • Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80-84. Lei, J., Fu, X., Juchem, I., & Hogrefe, D. (2005). Architectural thoughts and requirements considerations on video streaming over the Internet. Technical Report No. IFI-TB-2005-06.
  • Malić, M., Dobrilović, D., & Petrov, I. (2016). Example of IoT platform usage for wireless video surveillance with support of NoSQL and cloud systems. Proceedings of the ICAIIT2016, 27-34.
  • Mandal, S., Hewelt, M., Weske, M.: A Framework for Integrating Real-World Events and Business Processes in an IoT Environment. In: Panetto, H., et al. (eds.) On the Move to Meaningful Internet Systems. OTM 2017 Conferences, OTM 2017. LNCS, vol. 10573, pp. 194–212. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69462-7_13
  • Meyer, S., Ruppen, A., Magerkurth, C.: Internet of Things-aware process modeling: integrating iot devices as business process resources. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 84–98. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38709-8_6
  • Özgür, C.; Alias, C.; Noche, B. (2015): Comparing sensor-based and camera-based approaches to recognizing the occupancy status of the load handling device of forklift trucks. In: Noche, Bernd (ed.) (2015): Tagungsband zum 11. Fachkolloquium der Wissenschaftlichen Gesellschaft für Technische Logistik e.V.. Duisburg, Germany, 30 September - 01 October 2015. Scientific Society of Logistics Engineering, pp. 73–81.
  • Raghavendra M, Bharath AM, Dhananjaya V, Bharath, Nithyanandhan S. IoT Based Thermal Surveillance and Security System (May 13, 2019). Available at SSRN. http://dx.doi.org/10.2139/ssrn.3387538.
  • Random Nerd Tutorials, ESP32-CAM-FTDI-programmer, https://i0.wp.com/randomnerdtutorials.com/wp-content/uploads/2019/08/ESP32-CAM-FTDI-programmer-5V-supply.png?w=813&ssl=1, (accessed date :09.01.2021)
  • Rawlings, K. (2019). How IoT Technology is Revolutionizing the Retail Industry. TotalReatil. https://www.mytotalretail.com/article/how-iot-technology-is-revolutionizing-the-retail-industry/ (accessed date:20.02.2021)
  • Ringe, A., Dalavi, M., Kabugade, S., & Mane, P. (2019). IoT based smart refrigerator using Raspberry Pi. International Journal of Research and Analytical Reviews, 154-158.
  • Sammoud, A., Kumar, A., Bayoumi, M., & Elarabi, T. (2017, May). Real-time streaming challenges in Internet of Video Things (IoVT). In 2017 IEEE International Symposium on Circuits and Systems (ISCAS) (pp. 1-4). IEEE.
  • Seralathan, Y., Oh, T. T., Jadhav, S., Myers, J., Jeong, J. P., Kim, Y. H., & Kim, J. N. (2018, February). IoT security vulnerability: A case study of a Web camera. In 2018 20th International Conference on Advanced Communication Technology (ICACT) (pp. 172-177). IEEE.
  • Testo (2021). Kalite kontrol ve güvence. Testo: Be sure. https://www.testo.com/tr-TR/uygulamalar/uretim-kalite-kontrol, (accessed date:20.02.2021)
  • The Manufacturer (2018). Applications of IoT in Manufacturing Plants. https://www.themanufacturer.com/articles/applications-iot-manufacturing-plants/, (accessed date:20.02.2021)
  • Wee, S. J., & Apostolopoulos, J. G. (2001, May). Secure scalable video streaming for wireless networks. In IEEE International Conference On Acoustics Speech and Signal Processing (Vol. 4, pp. IV-2049). IEEE; 1999.
There are 28 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Ömer Aydın 0000-0002-7137-4881

İbrahim İsmail Erhan This is me 0000-0001-6290-9437

Early Pub Date July 8, 2021
Publication Date July 7, 2021
Published in Issue Year 2021 Volume: 7 Issue: 1

Cite

APA Aydın, Ö., & Erhan, İ. İ. (2021). Video or Image Transmission Security for ESP-EYE IoT device used in Business Processes. Yönetim Bilişim Sistemleri Dergisi, 7(1), 1-9.
AMA Aydın Ö, Erhan İİ. Video or Image Transmission Security for ESP-EYE IoT device used in Business Processes. Yönetim Bilişim Sistemleri Dergisi. July 2021;7(1):1-9.
Chicago Aydın, Ömer, and İbrahim İsmail Erhan. “Video or Image Transmission Security for ESP-EYE IoT Device Used in Business Processes”. Yönetim Bilişim Sistemleri Dergisi 7, no. 1 (July 2021): 1-9.
EndNote Aydın Ö, Erhan İİ (July 1, 2021) Video or Image Transmission Security for ESP-EYE IoT device used in Business Processes. Yönetim Bilişim Sistemleri Dergisi 7 1 1–9.
IEEE Ö. Aydın and İ. İ. Erhan, “Video or Image Transmission Security for ESP-EYE IoT device used in Business Processes”, Yönetim Bilişim Sistemleri Dergisi, vol. 7, no. 1, pp. 1–9, 2021.
ISNAD Aydın, Ömer - Erhan, İbrahim İsmail. “Video or Image Transmission Security for ESP-EYE IoT Device Used in Business Processes”. Yönetim Bilişim Sistemleri Dergisi 7/1 (July 2021), 1-9.
JAMA Aydın Ö, Erhan İİ. Video or Image Transmission Security for ESP-EYE IoT device used in Business Processes. Yönetim Bilişim Sistemleri Dergisi. 2021;7:1–9.
MLA Aydın, Ömer and İbrahim İsmail Erhan. “Video or Image Transmission Security for ESP-EYE IoT Device Used in Business Processes”. Yönetim Bilişim Sistemleri Dergisi, vol. 7, no. 1, 2021, pp. 1-9.
Vancouver Aydın Ö, Erhan İİ. Video or Image Transmission Security for ESP-EYE IoT device used in Business Processes. Yönetim Bilişim Sistemleri Dergisi. 2021;7(1):1-9.