9780470519240

IPTV Security : Protecting High-Value Digital Contents

by
  • ISBN13:

    9780470519240

  • ISBN10:

    047051924X

  • Format: Hardcover
  • Copyright: 2008-02-19
  • Publisher: WILEY

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $166.25 Save up to $16.62
  • Rent Book $149.63
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV.IPTV Security describes the science and history behind TV as well as detailed descriptions of all the architectural components that comprise an IPTV environment. It covers subjects logically from the Head End passing through the aggregation network and concluding with the Home End environment. The countermeasures required to ensure the safe operation of the IPTV environment are also examined, including Digital Rights Management technologies, network level security and application level security. IPTV Security defines the security model for an IPTV environment, ensuring that all critical elements are covered and a layered approach to security is implemented.One of the only books available on IPTV Security Provides a comprehensive view of IPTV components along with the associated threats and required countermeasures Detailed descriptions allow readers to understand the technology even if new to the field A complete reference guide to the security aspects of IPTV.This book is ideal for anyone responsible for IPTV security such as security officers and auditors working with internet services and telecommunications providers, phone and cable companies, content owners and security consultants and architects. It will also be of interest to networking and security engineers, software developers, network operators and university lectures and students involved in media, IT and security.

Author Biography

David Ramirez, Alcatel-Lucent, UK. David is Senior Manager of Alcatel-Lucent’s Security Consulting practice where his responsibilities include Innovation & Technology, Thought Leadership and Knowledge Sharing. He has contributed to several magazines, newspapers and web sites on topics such as Ethical Hacking, Web Security, Security Incidents, Forensics, Digital Certificates, etc. David is the author of a white paper on IPTV Threats for Lucent, interviews and articles for the IEC, Lucent, Webtorials, magazines in Europe and the US. He is also speaker at several European and Easter European conferences on security and telecommunications, where he presented the topic of IPTV Security, security for converged networks and networking security.

Table of Contents

Prefacep. xv
About the Authorp. xvii
Introduction to IPTVp. 1
Introductionp. 1
General Threats to IPTV Deploymentsp. 3
Access Fraudp. 4
Unauthorized Broadcastingp. 5
Access Interruptionp. 5
Content Corruptionp. 6
Principles Supporting IPTVp. 9
History of Video and Televisionp. 9
Televisionp. 10
Viewing Experience of Videop. 15
Line Scanningp. 15
Video Resolutionp. 15
Number of Pictures per Secondp. 16
Aspect Ratiop. 16
Video Compression Methodp. 16
Video Compressionp. 16
MPEG-2p. 17
H.263p. 18
MPEG-4p. 18
TCP/IP Principlesp. 19
Addressesp. 19
Routingp. 20
IP Packetp. 20
Summaryp. 21
Referencesp. 22
Bibliographyp. 22
IPTV Architecturep. 23
High-level Architecturep. 23
Service Typesp. 25
Functional Architecture for the IPTV Servicep. 25
Content Provisionp. 26
Content Deliveryp. 26
IPTV Controlp. 26
Subscriber Functionsp. 26
Securityp. 27
Detailed IPTV Architecturep. 28
Head End (IPTV Service Provider)p. 28
Critical Elements of the Head Endp. 29
Content Inputp. 30
MPEG Video Encoderp. 32
IP Encapsulatorp. 33
Video Transcoderp. 34
Content Management Serverp. 34
Video Repositoryp. 35
Digital Rights Managementp. 36
Video Streaming Serverp. 37
Subscriber Interactionp. 37
Transport and Aggregation Network (IPTV Network Provider)p. 40
RP and RTSPp. 49
RTSPp. 49
Ismacrypp. 51
PIMp. 52
MSDPp. 53
DSM-CCp. 53
Internet Service Providerp. 53
DSLAMp. 53
Home End (Subscriber)p. 57
Set Top Boxp. 58
Summaryp. 61
Referencesp. 62
Intellectual Propertyp. 63
Introductionp. 63
Supporting Technologyp. 73
Symmetric Key Cryptographyp. 73
Asymmetric Key Cryptographyp. 74
Hybrid Encryptionp. 74
Hash-Digestp. 74
Commonly Used Algorithmsp. 75
Public Key Infrastructure and ITU-T Recommendation X.509p. 76
Operation of PKIp. 80
Secure Socket Layer and Transport Layer Securityp. 81
General Mechanisms for Content Protectionp. 82
CPSp. 82
CASp. 83
DRMp. 83
Operation of DRM on IPTVp. 86
DRM Applied to VODp. 87
DRM Applied to Broadcast TVp. 88
Smart Cards and DRMp. 88
Storage Protectionp. 89
VCPSp. 89
CPRM/CPPM (CPSA)p. 89
Open DRMsp. 89
SDMIp. 89
OMA DRMp. 90
DMPp. 90
MPEG21p. 91
MPEG21 REL Data Modelp. 91
DVB-CPCMp. 91
DVB-CBMSp. 91
PERMp. 92
DCASp. 92
DReaMp. 92
OpenIPMPp. 93
OpenCAp. 93
PachyDRMp. 93
Interoperability Proposalsp. 93
Coralp. 93
DMPp. 94
SmartRightp. 94
SVPp. 94
OpenCPp. 95
OMArlinp. 95
Watermarking and Fingerprintingp. 95
Historyp. 95
Steganography Techniquesp. 98
Watermarking and Fingerprinting Principlesp. 99
Typical Attacksp. 101
Forensic Use of Digital Fingerprintsp. 103
WWW? (What Went Wrong?)p. 105
Introductionp. 105
Satellite Televisionp. 106
DVD Protectionp. 107
AACS on Blue-Ray and HD-DVDp. 108
Videos Over the Webp. 110
Authenticationp. 111
Summaryp. 111
Referencesp. 112
Bibliographyp. 113
Existing Threats to IPTV Implementationsp. 115
Introduction to IPTV Threatsp. 118
Specific Threats to IPTV Environmentsp. 120
IPTV Service Provider - Head Endp. 125
Video Feeds - Live or Prerecorded (Physical Media, OTA, etc.)p. 126
Video Switchp. 126
Ingest Gateway (Video Capture)p. 127
Platform SW/OS - Stored/Runningp. 127
Content Management Systemp. 127
Content Metadata from Video Repositoryp. 128
MPEG-2 Content from Video Repositoryp. 128
MPEG-4 Contentp. 128
Load Balancer Softwarep. 129
Master Video Streaming Softwarep. 129
CA/DRM Servicep. 129
SRTP Keysp. 129
Ismacryp Keyp. 130
Key Management Protocolp. 130
CA/DRM Service Administrationp. 131
VOD Application - Cached Video Content Metadatap. 131
Cached MPEG-2/MPEG-4 Content (Primary and Secondary Storage)p. 131
Video Streaming Softwarep. 132
Local Ad Insertion Authentication Information (e.g. User ID(s) and Password(s))p. 132
Local Ad Metadatap. 132
Local Ad MPEG-2/MPEG-4 Contentp. 133
Local Ad Insertion Tracking Informationp. 133
nPVR Application Recorded/Stored Content Metadatap. 133
Recorded/Stored MPEG-2/MPEG-4 Contentp. 134
nPVR/Video Recording Softwarep. 134
IPTV Network Provider - Transport and Aggregation Networkp. 134
Protocol Vulnerabilitiesp. 134
Content Distribution Service: Unicast Content Propagation - FTP or Other Transport Protocolp. 137
Multicast Content Propagationp. 137
IGMPv2/v3 (Snooping)p. 137
PIM (SM, SSM, Snooping)p. 138
MBGPp. 139
MSDPp. 139
MFTPp. 140
RTPp. 141
QoS Signaling (RSVP, DiffServ)p. 141
Management of Content Distribution Servicep. 142
Connection Management Servicep. 142
DSM-CC Protocolp. 143
RTSP Protocolp. 143
MPEG-2 Video Streamp. 143
MPEG-4 Video Streamp. 144
DSM-CCp. 144
RTSPp. 145
IPTV Subscriber - Home Endp. 145
Set Top Boxp. 145
STB Executing Softwarep. 147
DRM Softwarep. 147
Middleware Client SWp. 147
STB Platform SWp. 148
DVR/PVRp. 148
STB Credentialsp. 149
Digital Certificate (Software Provider)p. 150
STB Digital Certificatep. 150
Public Keys (Used for Digital Certificates)p. 151
STB User Storagep. 151
Downloaded Contentp. 151
User-created Contentp. 152
STB Smart Cardp. 152
STB Credentialsp. 152
STB Digital Certificatep. 153
STB High-definition Output Interfacep. 153
DVIp. 154
Residential Gatewayp. 154
DSLAMp. 154
Audience Metering Informationp. 154
Fraud Control Informationp. 155
IP Filtersp. 155
Broadcast/Multicast TV VLAN Servicep. 156
Decryption Keysp. 156
CWMPp. 157
NTP/SNTPp. 157
Broadcast/Multicast TV Applicationp. 158
MPEG-2 and MPEG-4 Video Streamp. 158
DSM-CCp. 158
Middleware Applicationp. 158
EPGp. 158
Menusp. 159
Subscriber Credentialsp. 159
Purchasing Informationp. 160
Digital Certificates (Content Provider)p. 161
Parental Controlsp. 161
PVR/DVR Applicationp. 162
User-sourced Contentp. 162
Application Managementp. 163
IPTV Usage Informationp. 163
IPTV Billing Informationp. 164
Conclusionp. 165
Countering the Threatsp. 167
Securing the Basisp. 167
Hardening Operating Systemsp. 167
Business Continuityp. 172
Intrusion Detection/Intrusion Preventionp. 173
Network Firewallsp. 174
Fraud Preventionp. 175
DRM-CASp. 176
Head End (IPTV Service Provider)p. 176
Critical Elements of the Head Endp. 176
Content Inputp. 177
Satellite Feedp. 177
Premium and Direct-feed Content, Pre-encoded Content Ready to be Encapsulatedp. 178
Physical Mediap. 179
MPEG Video Encoder and Video Transcoder Functionsp. 179
IP Encapsulatorp. 180
Content Management Serverp. 182
Video Repositoryp. 182
Digital Rights Managementp. 184
Video Streaming Serverp. 187
IGMPv2/v3p. 188
MBGPp. 188
MSDPp. 188
RTPp. 188
RTSP Packetsp. 189
RSVPp. 189
Middleware Serverp. 189
Aggregation and Transport Networkp. 190
DSLAMp. 190
Access and Session Controlp. 191
Routingp. 193
User Segregationp. 193
Quality of Servicep. 194
Virtual Networks and Virtual Circuitsp. 194
802.1X Authenticationp. 195
Firewallsp. 196
Home Endp. 197
Residential Gatewayp. 197
Filteringp. 197
Quality of Servicep. 198
Set Top Boxp. 198
Secure Processorp. 198
DRMp. 200
Output Protectionp. 200
Secure IPTV a Realityp. 201
Referencesp. 202
Converged Video Securityp. 205
Introductionp. 205
Threats to IPTV Deploymentsp. 205
Protecting Intellectual Propertyp. 206
VOD and Broadcastp. 207
Smart Cards and DRMp. 208
Countering the Threatsp. 208
Threat Referencesp. 210
Threat Modelsp. 211
Federated Identity in IPTV Environmentsp. 217
Introductionp. 217
IPTV Federated Identity Solutionsp. 217
SAML for Securityp. 218
The SAML Processp. 218
Reviewing Existing Standardsp. 220
Applicability to an IPTV Security Environmentp. 220
Internal Applicationsp. 220
Set Top Box Securityp. 221
Video on Demandp. 221
Barbarians at the Gatep. 223
Barbarians at the Gatep. 223
How to Break an IPTV Environmentp. 224
Network Under Siegep. 224
Confidentialityp. 224
Integrityp. 225
Availabilityp. 225
Countermeasuresp. 225
Set Top Boxp. 225
DSLAMp. 226
Routingp. 227
User Segregationp. 228
Quality of Servicep. 228
Virtual Networks and Virtual Circuitsp. 229
Conclusionp. 229
Indexp. 231
Table of Contents provided by Ingram. All Rights Reserved.

Rewards Program

Write a Review