Pub Date : 2020-12-01DOI: 10.1109/EUC50751.2020.00010
Sven-Jannik Wöhnert, Kai Hendrik Wöhnert, Eldar Almamedov, V. Skwarek
Proof of integrity in produced video data by surveillance cameras requires active forensic methods such as signatures, otherwise authenticity and integrity can be comprised and data becomes unusable e. g. for legal evidence. But a simple file- or stream-signature loses its validity when the stream is cut in parts or by separating data and signature. Using the principles of security in distributed systems similar to those of blockchain and distributed ledger technologies (BC/DLT), a chain which consists of the frames of a video which frame hash values will be distributed among a camera sensor network is presented. The backbone of this Framechain within the camera sensor network will be a camera identity concept to ensure accountability, integrity and authenticity according to the extended CIA triad security concept. Modularity by secure sequences, autarky in proof and robustness against natural modulation of data are the key parameters of this new approach. It allows the standalone data and even parts of it to be used as hard evidence.
{"title":"Trusted Video Streams in Camera Sensor Networks","authors":"Sven-Jannik Wöhnert, Kai Hendrik Wöhnert, Eldar Almamedov, V. Skwarek","doi":"10.1109/EUC50751.2020.00010","DOIUrl":"https://doi.org/10.1109/EUC50751.2020.00010","url":null,"abstract":"Proof of integrity in produced video data by surveillance cameras requires active forensic methods such as signatures, otherwise authenticity and integrity can be comprised and data becomes unusable e. g. for legal evidence. But a simple file- or stream-signature loses its validity when the stream is cut in parts or by separating data and signature. Using the principles of security in distributed systems similar to those of blockchain and distributed ledger technologies (BC/DLT), a chain which consists of the frames of a video which frame hash values will be distributed among a camera sensor network is presented. The backbone of this Framechain within the camera sensor network will be a camera identity concept to ensure accountability, integrity and authenticity according to the extended CIA triad security concept. Modularity by secure sequences, autarky in proof and robustness against natural modulation of data are the key parameters of this new approach. It allows the standalone data and even parts of it to be used as hard evidence.","PeriodicalId":331605,"journal":{"name":"2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/EUC50751.2020.00012
Jialong Li, Kazuya Aizawa, K. Tei, S. Honiden
In event-based systems, safety properties are critical requirements to prevent the system from bad things happen. However, safety properties may be violated because of the runtime system functional fault. From the viewpoint of a self-adaptive system, such a system should be requirement-aware and changes its behavior to satisfy the designed requirements as much as possible. The previous work proposed a method to analyze possible adaptation options with degrading different requirements. Here, we propose an efficient difference analysis algorithm to shorten the analysis time so that the adaptation to functional fault can be more timely. Our idea is to reuse the analysis result of development time and re-analyze the changed part only, instead of performing the complete analysis from scratch. We evaluated our algorithm’s efficiency based on three case studies: a coalmine pump-control system, a cyber-physical security people-flow restriction system, and a factory production cell system. The experiment results indicate that our algorithm averagely reduces 75.9% of analysis time compared with the existing analysis technique.
{"title":"Efficient Difference Analysis Algorithm for Runtime Requirement Degradation under System Functional Fault","authors":"Jialong Li, Kazuya Aizawa, K. Tei, S. Honiden","doi":"10.1109/EUC50751.2020.00012","DOIUrl":"https://doi.org/10.1109/EUC50751.2020.00012","url":null,"abstract":"In event-based systems, safety properties are critical requirements to prevent the system from bad things happen. However, safety properties may be violated because of the runtime system functional fault. From the viewpoint of a self-adaptive system, such a system should be requirement-aware and changes its behavior to satisfy the designed requirements as much as possible. The previous work proposed a method to analyze possible adaptation options with degrading different requirements. Here, we propose an efficient difference analysis algorithm to shorten the analysis time so that the adaptation to functional fault can be more timely. Our idea is to reuse the analysis result of development time and re-analyze the changed part only, instead of performing the complete analysis from scratch. We evaluated our algorithm’s efficiency based on three case studies: a coalmine pump-control system, a cyber-physical security people-flow restriction system, and a factory production cell system. The experiment results indicate that our algorithm averagely reduces 75.9% of analysis time compared with the existing analysis technique.","PeriodicalId":331605,"journal":{"name":"2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123171848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}