Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

02.03.2017

Analysis and Security Evaluation of Security Threat on Broadcasting Service

verfasst von: Jong Han Lee, Seung Joo Kim

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper defines and maps all possible threats to broadcasting services. Viewers currently use various types of broadcasting services—including cable TV, IPTV, and mobile TV, among others—and broadcast business operators are now developing the appropriate security mechanisms for each medium to safely and reliably provide broadcasting services to their audiences. Unlike mobile TV, which uses of a public network as in an over-the-top configuration, cable TV and IPTV are basically closed networks in terms of network security. However, they also link with external networks to provide additional services (bidirectional services or commerce-related services). Therefore, broadcast business operators of with various types of broadcast media are susceptible to security threats from which their broadcasting services may come to a halt or may be abused by hackers, such as with well-developed APT attacks, as well as other common external attacks. The common vulnerability scoring system for IT security is used to conduct a quantitative evaluation of the risk to security threats for broadcasting services. We also derive the results of a penetration test for the STB through the results presented with respect to a security threat. This result will help address potential security vulnerabilities in broadcasting services.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat EBU Project Group B/CA. (1995). Functional model of a conditional access system, EBU Technical Review. EBU Project Group B/CA. (1995). Functional model of a conditional access system, EBU Technical Review.
2.
Zurück zum Zitat Tu, F.-K., Laih, C.-S., & Tung, H.-H. (1999). On key distribution management for conditional access system on pay-TV system. IEEE Transactions on Consumer Electronics, 45(1), 151–158.CrossRef Tu, F.-K., Laih, C.-S., & Tung, H.-H. (1999). On key distribution management for conditional access system on pay-TV system. IEEE Transactions on Consumer Electronics, 45(1), 151–158.CrossRef
3.
Zurück zum Zitat Tianbo, L., Feng, X., Yong, P., & Jin, X. (2011). Analysis of security standardization for IPTV. In 2011 3rd international conference on advanced computer control, pp. 219–223. Tianbo, L., Feng, X., Yong, P., & Jin, X. (2011). Analysis of security standardization for IPTV. In 2011 3rd international conference on advanced computer control, pp. 219–223.
4.
Zurück zum Zitat Song, W. J., Kim, W. H., Kim, B. G., Kang, M., & Choi, M. (2003). Contents protection system using smart card interface for digital CATV network based on the OpenCable specification. In 2003 IEEE international conference on consumer electronics, pp. 274–275. Song, W. J., Kim, W. H., Kim, B. G., Kang, M., & Choi, M. (2003). Contents protection system using smart card interface for digital CATV network based on the OpenCable specification. In 2003 IEEE international conference on consumer electronics, pp. 274–275.
6.
Zurück zum Zitat Joh, H., & Malaiya, Y. K. (2010). A framework for software security risk evaluation using the vulnerability lifecycle and CVSS metrics. In 2010 international workshop on risk trust in extended enterprises, pp. 430–434. Joh, H., & Malaiya, Y. K. (2010). A framework for software security risk evaluation using the vulnerability lifecycle and CVSS metrics. In 2010 international workshop on risk trust in extended enterprises, pp. 430–434.
7.
Zurück zum Zitat Joh, H., & Malaiya, Y. K. (2011). Defining and assessing quantitative security risk measures using vulnerability lifecycle and CVSS metrics. In The 2011 international conference on security and management, pp. 10–16. Joh, H., & Malaiya, Y. K. (2011). Defining and assessing quantitative security risk measures using vulnerability lifecycle and CVSS metrics. In The 2011 international conference on security and management, pp. 10–16.
8.
Zurück zum Zitat Wang, S., Xia, C., Jinghua, & Jia, Q. (2015). Vulnerability evaluation based on CVSS and environmental information statistics. In 2015 4th international conference on computer science and network technology, pp. 1249–1252. Wang, S., Xia, C., Jinghua, & Jia, Q. (2015). Vulnerability evaluation based on CVSS and environmental information statistics. In 2015 4th international conference on computer science and network technology, pp. 1249–1252.
9.
Zurück zum Zitat Younis, A., Malaiya, Y. K., & Ray, I. (2016). Evaluating CVSS base score using vulnerability rewards programs. ICT Systems Security and Privacy Protection, 471, 62–75.CrossRef Younis, A., Malaiya, Y. K., & Ray, I. (2016). Evaluating CVSS base score using vulnerability rewards programs. ICT Systems Security and Privacy Protection, 471, 62–75.CrossRef
10.
Zurück zum Zitat Smith, E. S. (1970). The emergence of CATV: A look at the evolution of a revolution. Proceeding of the IEEE, 58(7), 967–982.CrossRef Smith, E. S. (1970). The emergence of CATV: A look at the evolution of a revolution. Proceeding of the IEEE, 58(7), 967–982.CrossRef
11.
Zurück zum Zitat Jeffrey, M., Park, S., Lee, K., Adams, G., & Savage, S. (2008). Content security for IPTV. IEEE Communications Magazine, 46(11), 138–146.CrossRef Jeffrey, M., Park, S., Lee, K., Adams, G., & Savage, S. (2008). Content security for IPTV. IEEE Communications Magazine, 46(11), 138–146.CrossRef
12.
Zurück zum Zitat Llort, J., Canovas, A., Tomas, J., & Atenas, M. (2012). A network management algorithm and protocol for improving QoE in mobile IPTV. Computer Communication, 35(15), 1855–1870.CrossRef Llort, J., Canovas, A., Tomas, J., & Atenas, M. (2012). A network management algorithm and protocol for improving QoE in mobile IPTV. Computer Communication, 35(15), 1855–1870.CrossRef
14.
Zurück zum Zitat ENISA Threat Landscape 2014. (2014). Overview of current and emerging cyber-threats. ENISA Threat Landscape 2014. (2014). Overview of current and emerging cyber-threats.
15.
Zurück zum Zitat NIST SP 800-30 Rev.1. (2012). Guide for conducting risk assessments. NIST SP 800-30 Rev.1. (2012). Guide for conducting risk assessments.
16.
Zurück zum Zitat ITU-T. (2009). Functional requirements and architecture for IPTV security aspects, X.1191. ITU-T. (2009). Functional requirements and architecture for IPTV security aspects, X.1191.
17.
Zurück zum Zitat CVSS v3.0. (2015). Specification document. CVSS v3.0. (2015). Specification document.
18.
19.
Metadaten
Titel
Analysis and Security Evaluation of Security Threat on Broadcasting Service
verfasst von
Jong Han Lee
Seung Joo Kim
Publikationsdatum
02.03.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4056-z

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt