Abstract
In this paper, we present security mechanism to protect IPTV service network from malicious Rendezvous Point. The IPTV service network considered in this paper is overlay network that is constructed in application layer. The overlay-based IPTV service network has several advantages such as cost-effectiveness, dynamicity and scalability. However, there are several security threats against overlay network such as malicious rendezvous point attack, routing interference attack, DoS(Denial of Service) attack and so on. In this paper we analyze the security threats of overlay-based IPTV service network, and we present the brief security guidelines against it. And we present detailed security mechanisms to protect IPTV service network from malicious Rendezvous Point. For this, we design the security mechanism to guarantee trust of rendezvous point and distribute security keys such as self-generated public key of each node and group key of rendezvous point safely manner. This approach is very simple, lightweight and implementation friendly.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Girod, B.: Transport of Real-Time Traffic over The Internet, Presentation slides (2005)
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)
Castro, M., Druschel, P., Kermarrec, A., Rowstron, A.: SCRIBE: A large-scale and decentralized application-level multicast infrastructure. IEEE Journal on Selected Areas in Communications 20(8) (October 2002)
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In: SIGCOMM 2001, San Diego, California, USA (2001)
Dhungel, P., Hei, X., Ross, K.W., Saxena, N.: The Pollution Attack in P2P Live Video Streaming Measurement Results and Defenses. In: Proc. of the workshop on peer-to-peer streaming and IPTV, pp. 323–328 (2007)
Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Computing Surveys 36(4), 335–371 (2004)
Lian, S., Sun, J., Liu, G.: Efficient Video Encryption Scheme based on Advanced Video Coding. Multimedia Tools and Applications 38(1) (May 2008)
Sethom, K., Masmoudi, K., Afifi, H.: A Secure P2P Architecture for Location Management. In: Proceedings of the 6th international conference on Mobile data management, Ayia Napa, Cyprus, May 09 - 13 (2005)
Xiaoyun, L., Tiejun, H., Longshe, H., Luntian, M.: A DRM Architecture for Manageable P2P Based IPTV System. In: ICME 2007 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwon, H., Moon, YH., Nah, J., Seo, D. (2009). Protecting IPTV Service Network against Malicious Rendezvous Point. In: Youm, H.Y., Yung, M. (eds) Information Security Applications. WISA 2009. Lecture Notes in Computer Science, vol 5932. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10838-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-10838-9_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10837-2
Online ISBN: 978-3-642-10838-9
eBook Packages: Computer ScienceComputer Science (R0)