On the integrity and authentication protection of real time data in broadcast networks

This paper discusses the optimization of security messaging in pay TV protocols applied over broadcast networks, in particular in the context of emerging mobile TV applications. In the latter environments, scarce bandwidth and limited handheld capability are particularly constraining in designing an...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Piron, L., Le Buhan, C., Moreillon, G., Wilson, R.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4
container_issue
container_start_page 1
container_title
container_volume
creator Piron, L.
Le Buhan, C.
Moreillon, G.
Wilson, R.
description This paper discusses the optimization of security messaging in pay TV protocols applied over broadcast networks, in particular in the context of emerging mobile TV applications. In the latter environments, scarce bandwidth and limited handheld capability are particularly constraining in designing an efficient yet robust Conditional Access System. A number of related industry standards are reviewed to highlight the possible impact of sub-optimal security messaging design. By means of a simple threat analysis, it is shown that the overhead brought by the authentication of the real-time content itself can be saved without sacrificing the overall application security.
doi_str_mv 10.1109/ISBMSB.2008.4536613
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4536613</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4536613</ieee_id><sourcerecordid>4536613</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-ed2940cf3dbf679970db0a286ef9b51642b9be3f30f387616bd9abdda5c87e313</originalsourceid><addsrcrecordid>eNo9kN1OAjEQhesPiYD7BNz0BRb7v9tLIaIkGC4g3pJ2O9Uq7JJujeHtbRSdmzmZk_MlZxCaUDKllOi75Wb2vJlNGSH1VEiuFOUXaEQFE4IqofklGjIqZSmJZFeo0FX959Xq-t8TYoBGmVFpoqhiN6jo-3eSh-uM1EP0sm5xegMc2gSvMaQTNq3D5jPf2hQak0LX4mPsEjQ_svM4gtnjFA6AnUkmJ7GNnXGN6RNuIX118aO_RQNv9j0U5z1G28XDdv5UrtaPy_n9qgyapBIc04I0njvrVaV1RZwlhtUKvLYyV2FWW-CeE8_rKhewThvrnJFNXQGnfIwmv9gAALtjDAcTT7vzu_g3q1VZmw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On the integrity and authentication protection of real time data in broadcast networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Piron, L. ; Le Buhan, C. ; Moreillon, G. ; Wilson, R.</creator><creatorcontrib>Piron, L. ; Le Buhan, C. ; Moreillon, G. ; Wilson, R.</creatorcontrib><description>This paper discusses the optimization of security messaging in pay TV protocols applied over broadcast networks, in particular in the context of emerging mobile TV applications. In the latter environments, scarce bandwidth and limited handheld capability are particularly constraining in designing an efficient yet robust Conditional Access System. A number of related industry standards are reviewed to highlight the possible impact of sub-optimal security messaging design. By means of a simple threat analysis, it is shown that the overhead brought by the authentication of the real-time content itself can be saved without sacrificing the overall application security.</description><identifier>ISSN: 2155-5044</identifier><identifier>ISBN: 9781424416486</identifier><identifier>ISBN: 1424416485</identifier><identifier>EISSN: 2155-5052</identifier><identifier>EISBN: 1424416493</identifier><identifier>EISBN: 9781424416493</identifier><identifier>DOI: 10.1109/ISBMSB.2008.4536613</identifier><identifier>LCCN: 2007906162</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Authentication ; Bandwidth ; broadcast security ; Cable TV ; Conditional Access ; Digital video broadcasting ; DVB-H ; DVB-IPDC ; FLO ; ISO ; Mobile pay TV ; Mobile TV ; OMA-BCAST ; Protection ; Satellite broadcasting ; TV broadcasting</subject><ispartof>2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2008, p.1-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4536613$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4536613$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Piron, L.</creatorcontrib><creatorcontrib>Le Buhan, C.</creatorcontrib><creatorcontrib>Moreillon, G.</creatorcontrib><creatorcontrib>Wilson, R.</creatorcontrib><title>On the integrity and authentication protection of real time data in broadcast networks</title><title>2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting</title><addtitle>ISBMSB</addtitle><description>This paper discusses the optimization of security messaging in pay TV protocols applied over broadcast networks, in particular in the context of emerging mobile TV applications. In the latter environments, scarce bandwidth and limited handheld capability are particularly constraining in designing an efficient yet robust Conditional Access System. A number of related industry standards are reviewed to highlight the possible impact of sub-optimal security messaging design. By means of a simple threat analysis, it is shown that the overhead brought by the authentication of the real-time content itself can be saved without sacrificing the overall application security.</description><subject>Access protocols</subject><subject>Authentication</subject><subject>Bandwidth</subject><subject>broadcast security</subject><subject>Cable TV</subject><subject>Conditional Access</subject><subject>Digital video broadcasting</subject><subject>DVB-H</subject><subject>DVB-IPDC</subject><subject>FLO</subject><subject>ISO</subject><subject>Mobile pay TV</subject><subject>Mobile TV</subject><subject>OMA-BCAST</subject><subject>Protection</subject><subject>Satellite broadcasting</subject><subject>TV broadcasting</subject><issn>2155-5044</issn><issn>2155-5052</issn><isbn>9781424416486</isbn><isbn>1424416485</isbn><isbn>1424416493</isbn><isbn>9781424416493</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9kN1OAjEQhesPiYD7BNz0BRb7v9tLIaIkGC4g3pJ2O9Uq7JJujeHtbRSdmzmZk_MlZxCaUDKllOi75Wb2vJlNGSH1VEiuFOUXaEQFE4IqofklGjIqZSmJZFeo0FX959Xq-t8TYoBGmVFpoqhiN6jo-3eSh-uM1EP0sm5xegMc2gSvMaQTNq3D5jPf2hQak0LX4mPsEjQ_svM4gtnjFA6AnUkmJ7GNnXGN6RNuIX118aO_RQNv9j0U5z1G28XDdv5UrtaPy_n9qgyapBIc04I0njvrVaV1RZwlhtUKvLYyV2FWW-CeE8_rKhewThvrnJFNXQGnfIwmv9gAALtjDAcTT7vzu_g3q1VZmw</recordid><startdate>200803</startdate><enddate>200803</enddate><creator>Piron, L.</creator><creator>Le Buhan, C.</creator><creator>Moreillon, G.</creator><creator>Wilson, R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200803</creationdate><title>On the integrity and authentication protection of real time data in broadcast networks</title><author>Piron, L. ; Le Buhan, C. ; Moreillon, G. ; Wilson, R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-ed2940cf3dbf679970db0a286ef9b51642b9be3f30f387616bd9abdda5c87e313</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Access protocols</topic><topic>Authentication</topic><topic>Bandwidth</topic><topic>broadcast security</topic><topic>Cable TV</topic><topic>Conditional Access</topic><topic>Digital video broadcasting</topic><topic>DVB-H</topic><topic>DVB-IPDC</topic><topic>FLO</topic><topic>ISO</topic><topic>Mobile pay TV</topic><topic>Mobile TV</topic><topic>OMA-BCAST</topic><topic>Protection</topic><topic>Satellite broadcasting</topic><topic>TV broadcasting</topic><toplevel>online_resources</toplevel><creatorcontrib>Piron, L.</creatorcontrib><creatorcontrib>Le Buhan, C.</creatorcontrib><creatorcontrib>Moreillon, G.</creatorcontrib><creatorcontrib>Wilson, R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Piron, L.</au><au>Le Buhan, C.</au><au>Moreillon, G.</au><au>Wilson, R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On the integrity and authentication protection of real time data in broadcast networks</atitle><btitle>2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting</btitle><stitle>ISBMSB</stitle><date>2008-03</date><risdate>2008</risdate><spage>1</spage><epage>4</epage><pages>1-4</pages><issn>2155-5044</issn><eissn>2155-5052</eissn><isbn>9781424416486</isbn><isbn>1424416485</isbn><eisbn>1424416493</eisbn><eisbn>9781424416493</eisbn><abstract>This paper discusses the optimization of security messaging in pay TV protocols applied over broadcast networks, in particular in the context of emerging mobile TV applications. In the latter environments, scarce bandwidth and limited handheld capability are particularly constraining in designing an efficient yet robust Conditional Access System. A number of related industry standards are reviewed to highlight the possible impact of sub-optimal security messaging design. By means of a simple threat analysis, it is shown that the overhead brought by the authentication of the real-time content itself can be saved without sacrificing the overall application security.</abstract><pub>IEEE</pub><doi>10.1109/ISBMSB.2008.4536613</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2155-5044
ispartof 2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2008, p.1-4
issn 2155-5044
2155-5052
language eng
recordid cdi_ieee_primary_4536613
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access protocols
Authentication
Bandwidth
broadcast security
Cable TV
Conditional Access
Digital video broadcasting
DVB-H
DVB-IPDC
FLO
ISO
Mobile pay TV
Mobile TV
OMA-BCAST
Protection
Satellite broadcasting
TV broadcasting
title On the integrity and authentication protection of real time data in broadcast networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T21%3A36%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On%20the%20integrity%20and%20authentication%20protection%20of%20real%20time%20data%20in%20broadcast%20networks&rft.btitle=2008%20IEEE%20International%20Symposium%20on%20Broadband%20Multimedia%20Systems%20and%20Broadcasting&rft.au=Piron,%20L.&rft.date=2008-03&rft.spage=1&rft.epage=4&rft.pages=1-4&rft.issn=2155-5044&rft.eissn=2155-5052&rft.isbn=9781424416486&rft.isbn_list=1424416485&rft_id=info:doi/10.1109/ISBMSB.2008.4536613&rft_dat=%3Cieee_6IE%3E4536613%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424416493&rft.eisbn_list=9781424416493&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4536613&rfr_iscdi=true