IPTV Security: Protecting High-Value Digital Contents / Edition 1

Hardcover (Print)
Buy New
Buy New from BN.com
$116.94
Used and New from Other Sellers
Used and New from Other Sellers
from $81.97
Usually ships in 1-2 business days
(Save 45%)
Other sellers (Hardcover)
  • All (8) from $81.97   
  • New (7) from $81.97   
  • Used (1) from $116.93   

Overview

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which created a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV.

IPTV Security describes the science and history behind TV as well as detailed descriptions of all the architectural components that comprise an IPTV environment. It covers subjects logically from the Head End passing through the aggregation network and concluding with the Home End environment. The countermeasures required to ensure the safe operation of the IPTV environment are also examined, including Digital Rights Management technologies, network level security and application level security. IPTV Security defines the security model for an IPTV environment, ensuring that all critical elements are covered and a layered approach to security is implemented.

This book is ideal for anyone responsible for IPTV security such as security officers and auditors working with internet services and telecommunications providers, phone and cable companies, content owners and security consultants and architects. It will also be of interest to networking and security engineers, software developers, network operators and university lectures and students involved in media, IT and security: One of the only books available on IPTV Security, Provides a comprehensive view of IPTV components along with the associated threats and required countermeasures, Detailed descriptions allow readers to understand the technology even if new to the field, A completereference guide to the security aspects of IPTV.

Read More Show Less

Product Details

  • ISBN-13: 9780470519240
  • Publisher: Wiley, John & Sons, Incorporated
  • Publication date: 3/14/2008
  • Edition number: 1
  • Pages: 252
  • Product dimensions: 6.85 (w) x 9.88 (h) x 0.76 (d)

Meet the Author

David Ramirez, Alcatel-Lucent, UK. David is Senior Manager of Alcatel-Lucent’s Security Consulting practice where his responsibilities include Innovation & Technology, Thought Leadership and Knowledge Sharing. He has contributed to several magazines, newspapers and web sites on topics such as Ethical Hacking, Web Security, Security Incidents, Forensics, Digital Certificates, etc. David is the author of a white paper on IPTV Threats for Lucent, interviews and articles for the IEC, Lucent, Webtorials, magazines in Europe and the US. He is also speaker at several European and Easter European conferences on security and telecommunications, where he presented the topic of IPTV Security, security for converged networks and networking security.
Read More Show Less

Table of Contents

Preface     xv
About the Author     xvii
Introduction to IPTV     1
Introduction     1
General Threats to IPTV Deployments     3
Access Fraud     4
Unauthorized Broadcasting     5
Access Interruption     5
Content Corruption     6
Principles Supporting IPTV     9
History of Video and Television     9
Television     10
Viewing Experience of Video     15
Line Scanning     15
Video Resolution     15
Number of Pictures per Second     16
Aspect Ratio     16
Video Compression Method     16
Video Compression     16
MPEG-2     17
H.263     18
MPEG-4     18
TCP/IP Principles     19
Addresses     19
Routing     20
IP Packet     20
Summary     21
References     22
Bibliography     22
IPTV Architecture     23
High-level Architecture     23
Service Types     25
Functional Architecture for the IPTV Service     25
Content Provision     26
Content Delivery     26
IPTV Control     26
Subscriber Functions     26
Security     27
Detailed IPTV Architecture     28
Head End (IPTV Service Provider)     28
Critical Elements of the Head End     29
Content Input     30
MPEG Video Encoder     32
IP Encapsulator     33
Video Transcoder     34
Content Management Server     34
Video Repository     35
Digital Rights Management     36
Video Streaming Server     37
Subscriber Interaction     37
Transport and Aggregation Network (IPTV Network Provider)     40
RP and RTSP     49
RTSP     49
Ismacryp     51
PIM     52
MSDP     53
DSM-CC     53
Internet Service Provider     53
DSLAM     53
Home End (Subscriber)     57
Set Top Box     58
Summary     61
References     62
Intellectual Property     63
Introduction     63
Supporting Technology     73
Symmetric Key Cryptography     73
Asymmetric Key Cryptography     74
Hybrid Encryption     74
Hash-Digest     74
Commonly Used Algorithms     75
Public Key Infrastructure and ITU-T Recommendation X.509     76
Operation of PKI     80
Secure Socket Layer and Transport Layer Security     81
General Mechanisms for Content Protection     82
CPS     82
CAS     83
DRM     83
Operation of DRM on IPTV     86
DRM Applied to VOD     87
DRM Applied to Broadcast TV     88
Smart Cards and DRM     88
Storage Protection     89
VCPS     89
CPRM/CPPM (CPSA)     89
Open DRMs     89
SDMI     89
OMA DRM     90
DMP     90
MPEG21     91
MPEG21 REL Data Model     91
DVB-CPCM     91
DVB-CBMS     91
PERM     92
DCAS     92
DReaM     92
OpenIPMP     93
OpenCA     93
PachyDRM      93
Interoperability Proposals     93
Coral     93
DMP     94
SmartRight     94
SVP     94
OpenCP     95
OMArlin     95
Watermarking and Fingerprinting     95
History     95
Steganography Techniques     98
Watermarking and Fingerprinting Principles     99
Typical Attacks     101
Forensic Use of Digital Fingerprints     103
WWW? (What Went Wrong?)     105
Introduction     105
Satellite Television     106
DVD Protection     107
AACS on Blue-Ray and HD-DVD     108
Videos Over the Web     110
Authentication     111
Summary     111
References     112
Bibliography     113
Existing Threats to IPTV Implementations   Andrew R. McGee   Frank A. Bastry   David Ramirez     115
Introduction to IPTV Threats     118
Specific Threats to IPTV Environments     120
IPTV Service Provider - Head End     125
Video Feeds - Live or Prerecorded (Physical Media, OTA, etc.)     126
Video Switch      126
Ingest Gateway (Video Capture)     127
Platform SW/OS - Stored/Running     127
Content Management System     127
Content Metadata from Video Repository     128
MPEG-2 Content from Video Repository     128
MPEG-4 Content     128
Load Balancer Software     129
Master Video Streaming Software     129
CA/DRM Service     129
SRTP Keys     129
Ismacryp Key     130
Key Management Protocol     130
CA/DRM Service Administration     131
VOD Application - Cached Video Content Metadata     131
Cached MPEG-2/MPEG-4 Content (Primary and Secondary Storage)     131
Video Streaming Software     132
Local Ad Insertion Authentication Information (e.g. User ID(s) and Password(s))     132
Local Ad Metadata     132
Local Ad MPEG-2/MPEG-4 Content     133
Local Ad Insertion Tracking Information     133
nPVR Application Recorded/Stored Content Metadata     133
Recorded/Stored MPEG-2/MPEG-4 Content     134
nPVR/Video Recording Software     134
IPTV Network Provider - Transport and Aggregation Network     134
Protocol Vulnerabilities     134
Content Distribution Service: Unicast Content Propagation - FTP or Other Transport Protocol     137
Multicast Content Propagation     137
IGMPv2/v3 (Snooping)     137
PIM (SM, SSM, Snooping)     138
MBGP     139
MSDP     139
MFTP     140
RTP     141
QoS Signaling (RSVP, DiffServ)     141
Management of Content Distribution Service     142
Connection Management Service     142
DSM-CC Protocol     143
RTSP Protocol     143
MPEG-2 Video Stream     143
MPEG-4 Video Stream     144
DSM-CC     144
RTSP     145
IPTV Subscriber - Home End     145
Set Top Box     145
STB Executing Software     147
DRM Software     147
Middleware Client SW     147
STB Platform SW     148
DVR/PVR     148
STB Credentials     149
Digital Certificate (Software Provider)     150
STB Digital Certificate     150
Public Keys (Used for Digital Certificates)     151
STB User Storage      151
Downloaded Content     151
User-created Content     152
STB Smart Card     152
STB Credentials     152
STB Digital Certificate     153
STB High-definition Output Interface     153
DVI     154
Residential Gateway     154
DSLAM     154
Audience Metering Information     154
Fraud Control Information     155
IP Filters     155
Broadcast/Multicast TV VLAN Service     156
Decryption Keys     156
CWMP     157
NTP/SNTP     157
Broadcast/Multicast TV Application     158
MPEG-2 and MPEG-4 Video Stream     158
DSM-CC     158
Middleware Application     158
EPG     158
Menus     159
Subscriber Credentials     159
Purchasing Information     160
Digital Certificates (Content Provider)     161
Parental Controls     161
PVR/DVR Application     162
User-sourced Content     162
Application Management     163
IPTV Usage Information     163
IPTV Billing Information      164
Conclusion     165
Countering the Threats     167
Securing the Basis     167
Hardening Operating Systems     167
Business Continuity     172
Intrusion Detection/Intrusion Prevention     173
Network Firewalls     174
Fraud Prevention     175
DRM-CAS     176
Head End (IPTV Service Provider)     176
Critical Elements of the Head End     176
Content Input     177
Satellite Feed     177
Premium and Direct-feed Content, Pre-encoded Content Ready to be Encapsulated     178
Physical Media     179
MPEG Video Encoder and Video Transcoder Functions     179
IP Encapsulator     180
Content Management Server     182
Video Repository     182
Digital Rights Management     184
Video Streaming Server     187
IGMPv2/v3     188
MBGP     188
MSDP     188
RTP     188
RTSP Packets     189
RSVP     189
Middleware Server     189
Aggregation and Transport Network     190
DSLAM      190
Access and Session Control     191
Routing     193
User Segregation     193
Quality of Service     194
Virtual Networks and Virtual Circuits     194
802.1X Authentication     195
Firewalls     196
Home End     197
Residential Gateway     197
Filtering     197
Quality of Service     198
Set Top Box     198
Secure Processor     198
DRM     200
Output Protection     200
Secure IPTV a Reality     201
References     202
Converged Video Security     205
Introduction     205
Threats to IPTV Deployments     205
Protecting Intellectual Property     206
VOD and Broadcast     207
Smart Cards and DRM     208
Countering the Threats     208
Threat References     210
Threat Models     211
Federated Identity in IPTV Environments     217
Introduction     217
IPTV Federated Identity Solutions     217
SAML for Security     218
The SAML Process      218
Reviewing Existing Standards     220
Applicability to an IPTV Security Environment     220
Internal Applications     220
Set Top Box Security     221
Video on Demand     221
Barbarians at the Gate     223
Barbarians at the Gate     223
How to Break an IPTV Environment     224
Network Under Siege     224
Confidentiality     224
Integrity     225
Availability     225
Countermeasures     225
Set Top Box     225
DSLAM     226
Routing     227
User Segregation     228
Quality of Service     228
Virtual Networks and Virtual Circuits     229
Conclusion     229
Index     231
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)