Security in Broadcast IP - SMPTE 2018

The need for security in the age of IP-based broadcasting has increased drastically because just as IP is more ubiquitous, it’s also more easily hacked.

Edmund Dengler, of eTrans Research Inc. and Leigh Whitcomb, an architect for Imagine Communications, presented a look at the risks that the move toward IP production are presenting to the broadcast industry.

Dengler began by saying, “This has actually happened before. Remember when the first security cameras were installed? They could easily be cracked into to gain access to the inside of a facility,” he said. “The same happened in the early days of VOIP (Voice over IP) when those insecure lines could be tapped into.”

He then described how his firm was contracted to test the security of a major bank, and tapped into their systems through their own phone PBX branch exchange.

He then described the network diagram of a typical IP security system, showing its vulnerability with the statistic that in 2016, 35% of traditional TV companies suffered cyber attacks.

A typical, vulnerable IP security system (click to enlarge).

A typical, vulnerable IP security system (click to enlarge).

It’s apparent that the Essence Devices have unsecured management, and one of them is devoid of ST 2022-7 (“Seamless Protection Switching”) protection.

“As systems are getting more complex, and stations have less staff, the situation is just getting worse,” Dengler said.

So what can we do for protection?

‘Well, you could put everything into a concrete bunker,” Whitcomb said, “but that is not practical. So you could isolate control systems, but if even one of them can be compromised, the whole network is vulnerable. The fact is, your data side has to be as secure as your control side.”

One solution is daily system upgrades, but the experts related tales of many organizations who had not upgraded their systems for over five years. Almost anyone could get access.

After running an elaborate series of tests, what Dengler and Whitcomb would suggest is a network configuration employing SMPTE ST 2059 which describes how to synchronize video equipment over an IP network.

A more secure IP nework with SMPTE ST 2059 (click to enlarge).

A more secure IP nework with SMPTE ST 2059 (click to enlarge).

It is based on IEEE 1588, which is the Precision Time Protocol (PTP) intended for local systems requiring accuracy beyond those attainable using Network Time Protocol (NTP) for clock synchronization between computer systems over packet-switched, variable-latency data networks.

“This leverages the security concerns of industries like telco and banking,” Whitcomb said. “So by using some rather simple and actionable technologies based on SMPTE standards, also being worked on by folks like Apple, the Joint Taskforce on Networked Media and others, we can push the industry forward.

You might also like...

Essential Guide: Intelligent CDN For Broadcasters

Media streaming over the internet is unique. Packet switched networks were never designed to deliver continuous and long streams of media but instead were built to efficiently process transactional and short bursts of data. The long streams of video and…

AJA Video Provides Flexible Bridge From SDI To NDI And Back Again

As broadcast facilities and other organizations that use media to educate and inform continue to carefully make the move to video over IP, they currently face two main options, with a range of others in the wings. ​They may opt f…

Cellphone Apps Put Control And Monitoring In The Palm Of Your Hand

Due to the flexibility and virtually unlimited access of the Internet Protocol, manufacturers of broadcast and production equipment have for years provided customers with the remote ability, via an HTML 5 browser interface, to monitor and control hardware devices via a…

Studio Berlin Re-Imagines OB Van With Two Socially Distant Yet Combined Environments

The pandemic has affected the system design and operations of live sports production in a myriad of ways. At first it was difficult for many to figure out but then evolved into the deployment of innovative types of distributed workflows…

IP Security For Broadcasters: Part 2 - The Problem To Be Solved

By assuming that IP must be made secure, we run the risk of missing a more fundamental question that is often overlooked: why is IP so insecure?