{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T11:08:43Z","timestamp":1773486523366,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100010016","name":"Nottingham Trent University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010016","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The purpose of this article is to present a system that enhances the security, efficiency, and reconfigurability of an Internet-of-Things (IoT) system used for surveillance and monitoring. A Multi-Processor System-On-Chip (MPSoC) composed of Central Processor Unit (CPU) and Field-Programmable Gate Array (FPGA) is proposed for increasing the security and the frame rate of a smart IoT edge device. The private encryption key is safely embedded in the FPGA unit to avoid being exposed in the Random Access Memory (RAM). This allows the edge device to securely store and authenticate the key, protecting the data transmitted from the same Integrated Circuit (IC). Additionally, the edge device can simultaneously publish and route a camera stream using a lightweight communication protocol, achieving a frame rate of 14 frames per Second (fps). The performance of the MPSoC is compared to a NVIDIA Jetson Nano (NJN) and a Raspberry Pi 4 (RPI4) and it is found that the RPI4 is the most cost-effective solution but with lower frame rate, the NJN is the fastest because it can achieve higher frame-rate but it is not secure, and the MPSoC is the optimal solution because it offers a balanced frame rate and it is secure because it never exposes the secure key into the memory. The proposed system successfully addresses the challenges of security, scalability, and efficiency in an IoT system used for surveillance and monitoring. The Rivest-Shamir-Adleman (RSA) encryption key is securely stored and authenticated, and the edge device is able to simultaneously publish and route a camera stream feed high-definition images at 14 fps. The proposed system enhances the security, efficiency, and reconfigurability of an IoT system used for surveillance and monitoring. The RSA encryption key is effectively protected by the implementation of an MPSoC with Programmable Logic (PL), which also allows for faster processing and data transmission.<\/jats:p>","DOI":"10.1007\/s11265-023-01886-4","type":"journal-article","created":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T14:02:43Z","timestamp":1692108163000},"page":"1265-1275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure Video Streaming Using Dedicated Hardware"],"prefix":"10.1007","volume":"95","author":[{"given":"Nicholas","family":"Murray-Hill","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0171-7436","authenticated-orcid":false,"given":"Laura","family":"Fontes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1760-3871","authenticated-orcid":false,"given":"Pedro","family":"Machado","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7445-8573","authenticated-orcid":false,"given":"Isibor Kennedy","family":"Ihianle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,15]]},"reference":[{"key":"1886_CR1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.eswa.2019.05.014","volume":"133","author":"JH Nord","year":"2019","unstructured":"Nord, J. H., Koohang, A., & Paliszkiewicz, J. (2019). The internet of things: Review and theoretical framework. Expert Systems with Applications, 133, 97\u2013108.","journal-title":"Expert Systems with Applications"},{"key":"1886_CR2","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199\u2013221.","journal-title":"Computer Networks"},{"key":"1886_CR3","doi-asserted-by":"publisher","first-page":"102936","DOI":"10.1016\/j.jnca.2020.102936","volume":"177","author":"B Farahani","year":"2021","unstructured":"Farahani, B., Firouzi, F., & Luecking, M. (2021). The convergence of iot and distributed ledger technologies (dlt): Opportunities, challenges, and solutions. Journal of Network and Computer Applications, 177, 102936.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"1886_CR4","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/TMSCS.2015.2494014","volume":"1","author":"AP Johnson","year":"2015","unstructured":"Johnson, A. P., Chakraborty, R. S., & Mukhopadhyay, D. (2015). A puf-enabled secure architecture for fpga-based iot applications. IEEE Transactions on Multi-Scale Computing Systems, 1(2), 110\u2013122.","journal-title":"IEEE Transactions on Multi-Scale Computing Systems"},{"key":"1886_CR5","doi-asserted-by":"crossref","unstructured":"Wortmann, F., & Fl\u00fcchter, K. (2015). Internet of things. Business & Information Systems Engineering, v. 57. Available online: https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-015-0383-3.pdf. Accessed 1 July 2023.","DOI":"10.1007\/s12599-015-0383-3"},{"key":"1886_CR6","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1016\/j.procs.2020.04.150","volume":"171","author":"C Patel","year":"2020","unstructured":"Patel, C., & Doshi, N. (2020). A novel mqtt security framework in generic iot model. Procedia Computer Science, 171, 1399\u20131408.","journal-title":"Procedia Computer Science"},{"key":"1886_CR7","doi-asserted-by":"crossref","unstructured":"Shah, S. W. H., Mian, A. N., Mumtaz, S., Wen, M., Hong, T., & Kadoch, M. (2019). Protocol stack perspective for low latency and massive connectivity in future cellular networks. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), pp. 1\u20137. IEEE.","DOI":"10.1109\/ICC.2019.8762083"},{"key":"1886_CR8","doi-asserted-by":"crossref","unstructured":"\u00c7orak, B. H., Okay, F. Y., G\u00fczel, M., Murt, \u015e., & Ozdemir, S. (2018). Comparative analysis of iot communication protocols. In: 2018 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1\u20136. IEEE.","DOI":"10.1109\/ISNCC.2018.8530963"},{"key":"1886_CR9","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.procs.2019.08.049","volume":"155","author":"JP Queralta","year":"2019","unstructured":"Queralta, J. P., Gia, T. N., Zou, Z., Tenhunen, H., & Westerlund, T. (2019). Comparative study of lpwan technologies on unlicensed bands for m2m communication in the iot: Beyond Lora and Lorawan. Procedia Computer Science, 155, 343\u2013350.","journal-title":"Procedia Computer Science"},{"key":"1886_CR10","doi-asserted-by":"crossref","unstructured":"van\u00a0der Westhuizen, H. W., & Hancke, G. P. (2018). Practical comparison between coap and mqtt-sensor to server level. In: 2018 Wireless Advanced (WiAd), pp. 1\u20136. IEEE.","DOI":"10.1109\/WIAD.2018.8588443"},{"key":"1886_CR11","doi-asserted-by":"crossref","unstructured":"Khan, W., Ahmed, E., Hakak, S., Yaqoob, I., & Ahmed, A. (2019). Edge computing: A survey, future generation computer systems.","DOI":"10.1016\/j.future.2019.02.050"},{"issue":"2","key":"1886_CR12","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1109\/JIOT.2018.2805263","volume":"5","author":"G Premsankar","year":"2018","unstructured":"Premsankar, G., Di Francesco, M., & Taleb, T. (2018). Edge computing for the internet of things: A case study. IEEE Internet of Things Journal, 5(2), 1275\u20131284.","journal-title":"IEEE Internet of Things Journal"},{"key":"1886_CR13","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.future.2019.09.050","volume":"102","author":"SN Mohanty","year":"2020","unstructured":"Mohanty, S. N., Ramya, K., Rani, S. S., Gupta, D., Shankar, K., Lakshmanaprabu, S., & Khanna, A. (2020). An efficient lightweight integrated blockchain (elib) model for iot security and privacy. Future Generation Computer Systems, 102, 1027\u20131037.","journal-title":"Future Generation Computer Systems"},{"key":"1886_CR14","doi-asserted-by":"crossref","unstructured":"Elnawawy, M., Farhan, A., Al\u00a0Nabulsi, A., Al-Ali, A. -R., & Sagahyroon, A. (2019). Role of fpga in internet of things applications. In: 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 1\u20136. IEEE.","DOI":"10.1109\/ISSPIT47144.2019.9001747"},{"issue":"2","key":"1886_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-031-01849-7","volume":"5","author":"J Teubner","year":"2013","unstructured":"Teubner, J., & Woods, L. (2013). Data processing on fpgas. Synthesis Lectures on Data Management, 5(2), 1\u2013118.","journal-title":"Synthesis Lectures on Data Management"},{"issue":"2","key":"1886_CR16","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCAS.2021.3071608","volume":"21","author":"J Hoozemans","year":"2021","unstructured":"Hoozemans, J., Peltenburg, J., Nonnemacher, F., Hadnagy, A., Al-Ars, Z., & Hofstee, H. P. (2021). Fpga acceleration for big data analytics: Challenges and opportunities. IEEE Circuits and Systems Magazine, 21(2), 30\u201347.","journal-title":"IEEE Circuits and Systems Magazine"},{"key":"1886_CR17","unstructured":"Guo, K., Zeng, S., Yu, J., Wang, Y., & Yang, H. (2017). A survey of fpga-based neural network accelerator. arXiv preprint arXiv:1712.08934"},{"key":"1886_CR18","doi-asserted-by":"publisher","unstructured":"Murray-Hill, N., & Machado, P. (2023). Secure video streaming using dedicated hardwar. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.7513129","DOI":"10.5281\/zenodo.7513129"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-023-01886-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-023-01886-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-023-01886-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T09:11:57Z","timestamp":1701508317000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-023-01886-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,15]]},"references-count":18,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1886"],"URL":"https:\/\/doi.org\/10.1007\/s11265-023-01886-4","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,15]]},"assertion":[{"value":"16 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The manuscript does not have any associated data, and the source code is available upon request. For more information regarding the work, please reach out to the corresponding author, who will gladly provide additional details.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}