Physical Security Interoperability Alliance

Last updated

The Physical Security Interoperability Alliance (PSIA) is a global consortium of more than 65 physical security manufacturers and systems integrators focused on promoting interoperability of IP-enabled security devices and systems across the physical security ecosystem as well as enterprise and building automation systems. [1]

Contents

The PSIA promotes and develops open specifications, relevant to networked physical security technology, across all industry segments including video, storage, analytics, intrusion, and access control. Its work is analogous to that of groups and consortia that have developed standardized methods that allow different types of equipment to seamlessly connect and share data, such as the USB and Bluetooth.

Specifications

The PSIA has created seven complementary specifications that enable systems and devices to interoperate and exchange data and intelligence. [2]

Three of these specifications are the “reference works” for the family of specifications. These are the Service Model; PSIA Common Metadata & Event Model; and the PSIA Common Security Model. These “common models” define and describe various security events as well as computer network and software protocols relevant to security devices and systems. [2]

The other four PSIA specifications correspond to domains in the security ecosystem. These are the IP Media Device specification, Recording and Content Management specification, Video Analytics specification and Area Control specification. These base their communications about security events on the PSIA Common Metadata & Event Model, one of the reference works described above. [2]

PSIA specifications are expected to become more critical to security system architecture as major users integrate video surveillance, access and area control, mobile devices and local and cloud-based storage across a common information technology platform. [3] PSIA has a liaison with the International Electrotechnical Commission on two specifications for access control and video. [4] The access control specification, IEC 60839-11-1, pending a vote, is expected to have a big impact on the manufacturing and interoperability of thousands of access control systems. [5]

PSIA Common Security Model v1.0

The PSIA Common Security Model (CSEC) specification is the comprehensive PSIA specification for all protocol, data and user security. It covers security requirements and definitions for network and session security, key and certificate management, and user permission management. These security definitions apply to all PSIA nodes.

PSIA Common Metadata & Event Model

The Common Metadata and Event Model provides a common set of services used by disparate physical security technologies, such as chemical/biological sensors, intrusion devices, video analytics, and traffic control sensors, to respond to various types of alerts. This specification allows vendors to simplify their interoperability communications by simply putting their device-specific information on top of the baseline Common Metadata and Event Model protocols and services. [6]

IP Media Device Specification (IPMD) 1.1

The IP Media Device (video) specification enables interoperability among disparate products that comply with the specification, such as an IP camera, intrusion device and video management or access control system. Interoperability based on this specification eliminates the need for software development kits for custom drivers and interfaces. It essentially creates a common API which can be used by both device and VMS vendors which offers an alternative to the proprietary APIs that exist today. [7]

Recording and Content Management (RaCM) Specification, Version 1.1a

The PSIA Recording and Content Management (RaCM) Specification, Version 1.1a, describes the PSIA standards for recording, managing, searching, describing, and streaming multimedia information over IP networks. This includes support for both NVRs and DVRs. The specification references the PSIA Service Model and IP Media Device specifications. XML schema definitions and XML examples are included in the specification to aid implementers in developing standards-based products. [8]

Video Analytics Specification v1.0

The v1.0 Video Analytics Specification (VAS) specifies an interface that enables IP devices and video management/surveillance systems to communicate video analytics data in a standardized way. The scope for the initial release of the specification focuses entirely on video analytics capabilities discovery and analytic data output. Video analytic capabilities discovery will include standard configuration data exchange to enable any analytic device to communicate to another device or application its basic analytic capabilities at the device level and the video channel level (for multichannel devices). This includes information such as the PSIA VAS version number supported, analytic vendor information (name, software version number, etc.), event types and mechanisms supported, and other supported configurations. From an analytic output perspective, the v1.0 VAS includes the definition of multiple types of analytic events, including alerts and counts, as well as video analytics metadata output. [9]

PSIA Area Control Specification V1.0

This specification standardizes the communication into access control and intrusion products, making them interoperable with an overall security system. This specification takes advantage of other PSIA specs, especially the Common Metadata and Events Model (CMEM). Harmonizing and sharing data between access control, intrusion, video, and analytics systems results in optimized and more easily integrated security management. [10]

PSIA Access Control Profile and Intrusion Detection Profile

The PSIA currently offers an Access Control Profile and an Intrusion Detection Profile, each derived from the PSIA’s Area Control Specification. Not every manufacturer supports every use case covered in the Area Control Specification. By complying with the applicable Profiles, these manufacturers can still build PSIA plug-and-play interoperability into their products. Products and technology that comply with a PSIA Profile will interoperate with any other product or technology that is PSIA compliant to that Profile. The PSIA offers a Profiles Test Tool to validate that a Profiles implementation is correct and complete and ensures manufacturers’ products will interoperate with other PSIA-compliant products. [11]

Specification adoption

More than 1500 companies have registered for the 1.0 IP Media Device (video) specification since its initial release in March 2008. Commercially available products and systems that are PSIA-compliant include physical security information management (PSIM) systems; video management systems; surveillance cameras; video analytics; access control systems; and sensors and intrusion detection devices. [12]

The founding of the PSIA

David Bunzel, executive director for a data storage industry standards association, began exploring surveillance video storage requirements in 2007 for the physical security industry. The physical security industry is known for its closed, proprietary systems; custom coding is typically required to integrate a closed system with any other system or digital tool. [13] Bunzel convened a meeting of security industry leaders to discuss creating open standards in the physical security industry.

The following companies were at the initial meeting: Adesta; ADT; Anixter; Axis; Cisco; CSC; GE Security; Genetec; IBM; IQinVision; Johnson Controls; March Networks; Pelco; ObjectVideo; Orsus; Panasonic; Sony; Texas Instruments; Verint; and Vidyo.

The development of PSIA specifications

PSIA supports license-free standards and specifications, which are vetted in an open and collaborative manner and offered to the security industry as a whole. Five active working groups, IP Video, Video Analytics, Recording and Content Management, Area Control, and Systems, develop these specifications.

A specification can be developed in a variety of ways, including a submission of a core document by a member company or a working group submission based on input from the committee members. In either case the document is expanded and reviewed by its working group members, with consensus determining the features and characteristics of the specification. [14]

Members

The organization's members include leading manufacturers, systems integrators, consultants and end users. These include Assa Abloy, Cisco Systems, HID, Honeywell, Ingersoll-Rand, Inovonics, IQinVision, Last Lock, Lenel, Kastle Systems, Milestone Systems, NICE Systems, ObjectVideo, OnSSI, Proximex, SCCG, Sentry Enterprises, Tyco International, UTC, Verint, Vidsys, and Z9 Security. [15] and formerly also HikVision and Dahua which were subsequently banned from ONVIF due to human rights abuses [16]

Timeline [17]

See also

Related Research Articles

OSI model Model of communication of seven abstraction layers

The Open Systems Interconnection model is a conceptual model that characterises and standardises the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard communication protocols.

A network switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.

Access control Selective restriction of access to a place or other resource, allowing only authorized users

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Open Archives Initiative

The Open Archives Initiative (OAI) was an informal organization, in the circle around the colleagues Herbert Van de Sompel, Carl Lagoze, Michael L. Nelson and Simeon Warner, to develop and apply technical interoperability standards for archives to share catalogue information (metadata). The group got together in the late late 1990s and was active for around twenty years. OAI coordinated in particular three specification activities: OAI-PMH, OAI-ORE and ResourceSync. All along the group worked towards building a "low-barrier interoperability framework" for archives containing digital content to allow people harvest metadata. Such sets of metadata are since then harvested to provide "value-added services", often by combining different data sets.

Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services. UPnP is intended primarily for residential networks without enterprise-class devices.

KNX (standard) Standard in building automation

KNX is an open standard for commercial and domestic building automation. KNX devices can manage lighting, blinds and shutters, HVAC, security systems, energy management, audio video, white goods, displays, remote control, etc. KNX evolved from three earlier standards; the European Home Systems Protocol (EHS), BatiBUS, and the European Installation Bus. It can use twisted pair, powerline, RF, or IP links. On this network, the devices form distributed applications and tight interaction is possible. This is implemented via interworking models with standardised datapoint types and objects, modelling logical device channels.

HomePlug is the family name for various power line communications specifications under the HomePlug designation, with each offering unique performance capabilities and coexistence or compatibility with other HomePlug specifications.

A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.

Wireless USB Wireless radio communication protocol

Wireless USB was a short-range, high-bandwidth wireless radio communication protocol created by the Wireless USB Promoter Group which intended to increase the availability of general USB-based technologies. It is unrelated to Wi-Fi. It was maintained by the WiMedia Alliance which ceased operations in 2009. Wireless USB is sometimes abbreviated as "WUSB", although the USB Implementers Forum discouraged this practice and instead prefers to call the technology Certified Wireless USB to distinguish it from the competing UWB standard.

The Network Processing Forum (NPF) is an industry forum that was organized to facilitate and accelerate the development of next-generation networking and telecommunications products based on network processing technologies. The NPF was merged into the Optical Internetworking Forum in June 2006. The NPF produces Hardware, Software, and Benchmark Interoperability Agreements. These agreements enable equipment manufacturers to lower their time to market and development cost by enabling a robust, multi-vendor ecosystem. It also lowers the total cost of ownership of systems based on their interoperability agreements by enabling investments in test and verification infrastructure as well as enabling competition.

Axis Communications

Axis Communications AB is a Swedish manufacturer of network cameras, access control, and network audio devices for the physical security and video surveillance industries.

Trusted Network Connect (TNC) is an open architecture for Network Access Control, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the Trusted Computing Group (TCG).

Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology, user or system authentication and network security enforcement.

IEC 60870 part 6 in electrical engineering and power system automation, is one of the IEC 60870 set of standards which define systems used for telecontrol in electrical engineering and power system automation applications. The IEC Technical Committee 57 have developed part 6 to provide a communication profile for sending basic telecontrol messages between two systems which is compatible with ISO standards and ITU-T recommendations.

Digital Security refers to various ways of protecting computer's internet account and files from intrusion by an outside user.

Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface. It collects and correlates events from existing disparate security devices and information systems to empower personnel to identify and proactively resolve situations. PSIM integration enables numerous organizational benefits, including increased control, improved situation awareness and management reporting. Ultimately, these solutions allow organizations to reduce costs through improved efficiency and to improve security through increased intelligence.

ONVIF is a global and open industry forum with the goal of facilitating the development and use of a global open standard for the interface of physical IP-based security products. ONVIF creates a standard for how IP products within video surveillance and other physical security areas can communicate with each other. ONVIF is an organization started in 2008 by Axis Communications, Bosch Security Systems and Sony.

The Interface for Metadata Access Points (IF-MAP) is an open specification for a client/server protocol developed by the Trusted Computing Group (TCG) as one of the core protocols of the Trusted Network Connect (TNC) open architecture.

Object storage is a computer data storage architecture that manages data as objects, as opposed to other storage architectures like file systems which manages data as a file hierarchy, and block storage which manages data as blocks within sectors and tracks. Each object typically includes the data itself, a variable amount of metadata, and a globally unique identifier. Object storage can be implemented at multiple levels, including the device level, the system level, and the interface level. In each case, object storage seeks to enable capabilities not addressed by other storage architectures, like interfaces that are directly programmable by the application, a namespace that can span multiple instances of physical hardware, and data-management functions like data replication and data distribution at object-level granularity.

References

  1. "Archived copy". Archived from the original on 2013-10-30. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  2. 1 2 3 "Archived copy". Archived from the original on 2013-10-30. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  3. "How New Technologies and Standards Like ONVIF and PSIA are Affecting Video Management Systems (VMS)" . Retrieved 2018-09-13.
  4. "IEC - Organizations with TC/SC liaisons > PSIA: List of TC/SCs Liaisons". www.iec.ch. Retrieved 2018-09-13.
  5. "Access Control & Fire - IHS Technology". www.imsresearch.com. Retrieved 2018-09-13.
  6. "Archived copy". Archived from the original on 2013-12-03. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  7. "Archived copy" (PDF). Archived from the original (PDF) on 2012-05-16. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  8. "Archived copy". Archived from the original on 2013-10-31. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  9. "Archived copy". Archived from the original on 2013-10-30. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  10. "Archived copy". Archived from the original on 2013-10-31. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  11. "Archived copy". Archived from the original on 2013-10-30. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  12. "Archived copy". Archived from the original on 2013-10-31. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  13. "Archived copy". Archived from the original on 2013-12-03. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  14. "Archived copy". Archived from the original on 2013-10-31. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  15. "Archived copy". Archived from the original on 2013-10-30. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)
  16. https://www.bloomberg.com/opinion/articles/2020-09-20/china-s-hikvision-tries-a-makeover-out-of-spy-tech-it-will-cost
  17. "Archived copy". Archived from the original on 2013-10-30. Retrieved 2013-11-15.{{cite web}}: CS1 maint: archived copy as title (link)