paint-brush
What The IoT Video Revolution Means For Securityby@nabto
179 reads

What The IoT Video Revolution Means For Security

by Carsten Rhod GregersenJuly 24th, 2024
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Video is no longer a primary feature but rather a secondary attribute that permeates the Internet of Things (IoT) The security industry must adapt to a landscape where surveillance cameras are distributed across devices with various functions. In 2026, the global surveillance market is estimated to grow to $54B, more than double the size of 2019.
featured image - What The IoT Video Revolution Means For Security
Carsten Rhod Gregersen HackerNoon profile picture

Video is everywhere. From repurposed image sensors in bird feeders to the seamless integration of connected doorbells, the addition of video to everyday devices is fundamentally reshaping surveillance. As a result, video is no longer a primary feature but rather a secondary attribute that permeates the Internet of Things (IoT).


The implications of this transformation are profound, urging the security industry to adapt to a landscape where surveillance cameras are distributed across devices with various functions. In turn, this shift ushers in a new era of consumer demands, driving product revamps and evolving opportunities within the market. Of course, with more cameras in the modern home and office, safely navigating this trend requires careful consideration.


Let’s consider the path ahead for security professionals with five key insights into the IoT video revolution.

The Evolution of Surveillance

We’ve come a long way from CCTV. In the early days of surveillance, fixed cameras were singular analog tools. Advancements led to the creation of digital multiplexing, which brought about motion recorders and time-lapse capabilities. Fast forward and the market continued to innovate. Today, surveillance encompasses everything from Internet Protocol (IP) cameras to cloud-based storage, remote alerts, and smart interconnectivity.


This story isn’t static and the advent of video-enabled IoT is the next chapter. Thanks to the upcycling of video sensors from older mobile phones, surveillance increasingly comes in all shapes and sizes. This opens up a world of possibilities for surveillance, automation, and connectivity that promises to redefine the years to come.

Beyond Cameras

Smart doorbells, pet cameras, baby monitors: surveillance devices are no longer just cameras. Inversely, regular devices now count surveillance features. And the market is more diverse and lucrative as a result.


This first product – the smart doorbell – is an example of this in action. Part surveillance and part convenience, this product does far more than alert occupants to the arrival of visitors. It monitors the front yard, enables two-way communication, and adds a layer of home security. Ten years after entering the market, smart doorbells are worth more than $3B. By the end of the decade, the segment is expected to grow 17% per year to a valuation of $11B.


The expansion of surveillance into devices represents an expansion of market opportunities for security companies. In 2026, for example, the global surveillance market is estimated to grow to $54B, more than double the size of 2019. Therefore, this is a lucrative opportunity for those willing to pivot. To do so successfully, however, demands a keen focus on research and development (R&D) and versatile skills.

A Fusion of Skills

Technically, there are important considerations in offering video-enabled devices. This is because incorporating video into devices goes far beyond simply adding a camera. Rather, it necessitates the development of an all-in-one system that not only captures image streams but also processes the data on-board.


Companies in this space quickly realize that crafting such devices requires specialized components. For instance, real-time operating systems may struggle to efficiently process and transmit video data, often necessitating a shift to a high-end operating system like Linux. Yet, this transition can introduce energy considerations, especially for battery-powered devices.


Further, video encoding and compression is no mean feat. Given that video significantly multiplies data volumes, developers must also incorporate chipset add-ons to encrypt the imagery for secure transmission. In essence, creating video-capable devices is a formidable task, rife with software, hardware, and development challenges.


In addition to these hurdles, companies will also need to develop companion apps and platforms that facilitate user-device interaction while prioritizing data transmission, security, and privacy. This introduces complexity on top of complexity. These obstacles underscore the need for companies developing devices in this direction to possess versatile skills (and plenty of patience).

The Vendor's Dilemma

Therefore, security companies must consider if this evolution is right for them. Of course, not every operator will find it necessary or feasible to develop video-enabled devices. Leaders must carefully evaluate the relevance of this shift within the context of their existing product lines. This evaluation process involves consideration of specific use cases and the flexibility to adapt as needed. Incorporating video into devices shouldn’t be a hasty response to passing trends. Rather, it should align with a well-founded business and technological strategy.


It’s also crucial to recognize that “device vision” doesn’t invariably translate to the inclusion of traditional cameras. Alternative technologies such as Lidar sensors, which determine distances using laser targeting and measuring the return times of reflected light, offer viable options. These sensors can be more cost-effective and less invasive for certain use cases. Ultimately, the sector must remain adaptable and discerning when addressing the market’s ever-evolving demands.

Security in Flux

Finally, we must address the cybersecurity elephant in the room. If cameras are in everything, and those devices connect to the internet, the reality is that hackers have a larger attack surface to exploit. And, a particularly sensitive attack surface at that. Unfortunately, hackers can and will target companies that don’t adequately protect themselves or their customers. This happened earlier in the year when this surveillance camera manufacturer recalled almost 5M cameras with easy-to-guess passwords.


Security companies venturing into connected video devices face a dual responsibility. First, they must achieve robust user authentication. This is possible by employing solutions like public key infrastructure (PKI) for cryptographic key-based security. This method works to strengthen resistance against brute force attacks and eliminate the vulnerability of shared secrets in the event of a breach. Additionally, secure data transfer is vital. Peer-to-peer connections that eschew intermediary servers in favor of end-to-end encrypted transmission best achieve this. Not only does this connection type enhance cybersecurity, but it also offers cost savings by avoiding cloud service fees based on file size, an important detail when handling high-quality video.


The IoT video revolution is transforming surveillance and security, offering new growth opportunities As video sensors become integral to an array of devices, executives must weigh the benefits carefully. This expansion requires a fusion of hardware and software skills, robust cybersecurity, and considerable R&D. Flexibility and adaptability are crucial to meet evolving market demands. It’s a significant shift, but one that must be approached cautiously to ensure both success and safety.