On the integrity and authentication protection of real time data in broadcast networks
This paper discusses the optimization of security messaging in pay TV protocols applied over broadcast networks, in particular in the context of emerging mobile TV applications. In the latter environments, scarce bandwidth and limited handheld capability are particularly constraining in designing an...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Piron, L. Le Buhan, C. Moreillon, G. Wilson, R. |
description | This paper discusses the optimization of security messaging in pay TV protocols applied over broadcast networks, in particular in the context of emerging mobile TV applications. In the latter environments, scarce bandwidth and limited handheld capability are particularly constraining in designing an efficient yet robust Conditional Access System. A number of related industry standards are reviewed to highlight the possible impact of sub-optimal security messaging design. By means of a simple threat analysis, it is shown that the overhead brought by the authentication of the real-time content itself can be saved without sacrificing the overall application security. |
doi_str_mv | 10.1109/ISBMSB.2008.4536613 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4536613</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4536613</ieee_id><sourcerecordid>4536613</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-ed2940cf3dbf679970db0a286ef9b51642b9be3f30f387616bd9abdda5c87e313</originalsourceid><addsrcrecordid>eNo9kN1OAjEQhesPiYD7BNz0BRb7v9tLIaIkGC4g3pJ2O9Uq7JJujeHtbRSdmzmZk_MlZxCaUDKllOi75Wb2vJlNGSH1VEiuFOUXaEQFE4IqofklGjIqZSmJZFeo0FX959Xq-t8TYoBGmVFpoqhiN6jo-3eSh-uM1EP0sm5xegMc2gSvMaQTNq3D5jPf2hQak0LX4mPsEjQ_svM4gtnjFA6AnUkmJ7GNnXGN6RNuIX118aO_RQNv9j0U5z1G28XDdv5UrtaPy_n9qgyapBIc04I0njvrVaV1RZwlhtUKvLYyV2FWW-CeE8_rKhewThvrnJFNXQGnfIwmv9gAALtjDAcTT7vzu_g3q1VZmw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On the integrity and authentication protection of real time data in broadcast networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Piron, L. ; Le Buhan, C. ; Moreillon, G. ; Wilson, R.</creator><creatorcontrib>Piron, L. ; Le Buhan, C. ; Moreillon, G. ; Wilson, R.</creatorcontrib><description>This paper discusses the optimization of security messaging in pay TV protocols applied over broadcast networks, in particular in the context of emerging mobile TV applications. In the latter environments, scarce bandwidth and limited handheld capability are particularly constraining in designing an efficient yet robust Conditional Access System. A number of related industry standards are reviewed to highlight the possible impact of sub-optimal security messaging design. By means of a simple threat analysis, it is shown that the overhead brought by the authentication of the real-time content itself can be saved without sacrificing the overall application security.</description><identifier>ISSN: 2155-5044</identifier><identifier>ISBN: 9781424416486</identifier><identifier>ISBN: 1424416485</identifier><identifier>EISSN: 2155-5052</identifier><identifier>EISBN: 1424416493</identifier><identifier>EISBN: 9781424416493</identifier><identifier>DOI: 10.1109/ISBMSB.2008.4536613</identifier><identifier>LCCN: 2007906162</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Authentication ; Bandwidth ; broadcast security ; Cable TV ; Conditional Access ; Digital video broadcasting ; DVB-H ; DVB-IPDC ; FLO ; ISO ; Mobile pay TV ; Mobile TV ; OMA-BCAST ; Protection ; Satellite broadcasting ; TV broadcasting</subject><ispartof>2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2008, p.1-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4536613$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4536613$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Piron, L.</creatorcontrib><creatorcontrib>Le Buhan, C.</creatorcontrib><creatorcontrib>Moreillon, G.</creatorcontrib><creatorcontrib>Wilson, R.</creatorcontrib><title>On the integrity and authentication protection of real time data in broadcast networks</title><title>2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting</title><addtitle>ISBMSB</addtitle><description>This paper discusses the optimization of security messaging in pay TV protocols applied over broadcast networks, in particular in the context of emerging mobile TV applications. In the latter environments, scarce bandwidth and limited handheld capability are particularly constraining in designing an efficient yet robust Conditional Access System. A number of related industry standards are reviewed to highlight the possible impact of sub-optimal security messaging design. By means of a simple threat analysis, it is shown that the overhead brought by the authentication of the real-time content itself can be saved without sacrificing the overall application security.</description><subject>Access protocols</subject><subject>Authentication</subject><subject>Bandwidth</subject><subject>broadcast security</subject><subject>Cable TV</subject><subject>Conditional Access</subject><subject>Digital video broadcasting</subject><subject>DVB-H</subject><subject>DVB-IPDC</subject><subject>FLO</subject><subject>ISO</subject><subject>Mobile pay TV</subject><subject>Mobile TV</subject><subject>OMA-BCAST</subject><subject>Protection</subject><subject>Satellite broadcasting</subject><subject>TV broadcasting</subject><issn>2155-5044</issn><issn>2155-5052</issn><isbn>9781424416486</isbn><isbn>1424416485</isbn><isbn>1424416493</isbn><isbn>9781424416493</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9kN1OAjEQhesPiYD7BNz0BRb7v9tLIaIkGC4g3pJ2O9Uq7JJujeHtbRSdmzmZk_MlZxCaUDKllOi75Wb2vJlNGSH1VEiuFOUXaEQFE4IqofklGjIqZSmJZFeo0FX959Xq-t8TYoBGmVFpoqhiN6jo-3eSh-uM1EP0sm5xegMc2gSvMaQTNq3D5jPf2hQak0LX4mPsEjQ_svM4gtnjFA6AnUkmJ7GNnXGN6RNuIX118aO_RQNv9j0U5z1G28XDdv5UrtaPy_n9qgyapBIc04I0njvrVaV1RZwlhtUKvLYyV2FWW-CeE8_rKhewThvrnJFNXQGnfIwmv9gAALtjDAcTT7vzu_g3q1VZmw</recordid><startdate>200803</startdate><enddate>200803</enddate><creator>Piron, L.</creator><creator>Le Buhan, C.</creator><creator>Moreillon, G.</creator><creator>Wilson, R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200803</creationdate><title>On the integrity and authentication protection of real time data in broadcast networks</title><author>Piron, L. ; Le Buhan, C. ; Moreillon, G. ; Wilson, R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-ed2940cf3dbf679970db0a286ef9b51642b9be3f30f387616bd9abdda5c87e313</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Access protocols</topic><topic>Authentication</topic><topic>Bandwidth</topic><topic>broadcast security</topic><topic>Cable TV</topic><topic>Conditional Access</topic><topic>Digital video broadcasting</topic><topic>DVB-H</topic><topic>DVB-IPDC</topic><topic>FLO</topic><topic>ISO</topic><topic>Mobile pay TV</topic><topic>Mobile TV</topic><topic>OMA-BCAST</topic><topic>Protection</topic><topic>Satellite broadcasting</topic><topic>TV broadcasting</topic><toplevel>online_resources</toplevel><creatorcontrib>Piron, L.</creatorcontrib><creatorcontrib>Le Buhan, C.</creatorcontrib><creatorcontrib>Moreillon, G.</creatorcontrib><creatorcontrib>Wilson, R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Piron, L.</au><au>Le Buhan, C.</au><au>Moreillon, G.</au><au>Wilson, R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On the integrity and authentication protection of real time data in broadcast networks</atitle><btitle>2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting</btitle><stitle>ISBMSB</stitle><date>2008-03</date><risdate>2008</risdate><spage>1</spage><epage>4</epage><pages>1-4</pages><issn>2155-5044</issn><eissn>2155-5052</eissn><isbn>9781424416486</isbn><isbn>1424416485</isbn><eisbn>1424416493</eisbn><eisbn>9781424416493</eisbn><abstract>This paper discusses the optimization of security messaging in pay TV protocols applied over broadcast networks, in particular in the context of emerging mobile TV applications. In the latter environments, scarce bandwidth and limited handheld capability are particularly constraining in designing an efficient yet robust Conditional Access System. A number of related industry standards are reviewed to highlight the possible impact of sub-optimal security messaging design. By means of a simple threat analysis, it is shown that the overhead brought by the authentication of the real-time content itself can be saved without sacrificing the overall application security.</abstract><pub>IEEE</pub><doi>10.1109/ISBMSB.2008.4536613</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2155-5044 |
ispartof | 2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2008, p.1-4 |
issn | 2155-5044 2155-5052 |
language | eng |
recordid | cdi_ieee_primary_4536613 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access protocols Authentication Bandwidth broadcast security Cable TV Conditional Access Digital video broadcasting DVB-H DVB-IPDC FLO ISO Mobile pay TV Mobile TV OMA-BCAST Protection Satellite broadcasting TV broadcasting |
title | On the integrity and authentication protection of real time data in broadcast networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T21%3A36%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On%20the%20integrity%20and%20authentication%20protection%20of%20real%20time%20data%20in%20broadcast%20networks&rft.btitle=2008%20IEEE%20International%20Symposium%20on%20Broadband%20Multimedia%20Systems%20and%20Broadcasting&rft.au=Piron,%20L.&rft.date=2008-03&rft.spage=1&rft.epage=4&rft.pages=1-4&rft.issn=2155-5044&rft.eissn=2155-5052&rft.isbn=9781424416486&rft.isbn_list=1424416485&rft_id=info:doi/10.1109/ISBMSB.2008.4536613&rft_dat=%3Cieee_6IE%3E4536613%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424416493&rft.eisbn_list=9781424416493&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4536613&rfr_iscdi=true |