IPTV network security: threats and countermeasures

With the increasing popularity of high quality multimedia contents of Internet Protocol Television (IPTV), its attacks and threats are also increasing parallelly. Consequently, it remains an important concern and may arise in various points of IPTV environments, e.g., home and core networks, deliver...

Full description

Bibliographic Details
Main Authors: M. S. A., Noman Ranak, Saiful Azad, B. M. F, Karnal, Ruhee, N. Nourin, Nisa, Nazrul, Kabir, M. M., Rahman, Kamal Z., Zamli
Format: Book Section
Language:English
English
Published: John Wiley & Sons 2018
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/21634/
http://umpir.ump.edu.my/id/eprint/21634/
http://umpir.ump.edu.my/id/eprint/21634/
http://umpir.ump.edu.my/id/eprint/21634/1/7.%20IPTV%20network%20security%20-threats%20and%20countermeasures.pdf
http://umpir.ump.edu.my/id/eprint/21634/2/7.1%20IPTV%20network%20security%20-threats%20and%20countermeasures.pdf
Description
Summary:With the increasing popularity of high quality multimedia contents of Internet Protocol Television (IPTV), its attacks and threats are also increasing parallelly. Consequently, it remains an important concern and may arise in various points of IPTV environments, e.g., home and core networks, delivery and management networks, content source, and so forth, To ensure a desired level of security to protect the contents and IPTV networks, multiple layers of security are mandatory. In this chapter, we only cover the security aspects of IPTV delivery networks, and others areout of the scope. Since all the contents of IPTV have to travel through one or multiple networks before reaching to the destination; it inherits all the security vulnerabilities that exist in the TCP/IP networks. Consequently, the basic security measures that are required to protect any TCP/IP network are equally applicable to the IPTV infrastructure. Moreover, several constraints of IPTV-related data also need to be taken into account. Any resilience technique that fails to ensure those constraints will certainly affect the consumer experience; and hence, it is undesirable. In this chapter, we overview all these issues in brief, Moreover, we also briefly mention the countermeasures that would assist to tackle these issues.