IP Security For Broadcasters: Part 3 - IPsec Explained

One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions through IPsec (IP Security) to alleviate these concerns.


All 12 articles in this series are available in our free 82 page eBook ‘IP Security For Broadcasters’ – download it HERE.

Articles in this series:


In their basic form, IP packets are sent in-the-clear across networks and the internet, that is, without any form of encryption. Anybody who has access to the network can not only read the packets, but also intercept them, change them, and resend them. The internet is effectively an untrusted network as we have no idea who has access to it and who is monitoring our data. For some applications this isn’t really an issue, but for others, it is. For example, a broadcaster will care deeply if unknown people can see, record, or tamper with their high value content when it is transferred over the internet.

Furthermore, the ability to intercept a packet and change its contents is particularly concerning as it lays the field open to viruses being embedded in the data packets, which in turn can be used to infiltrate IP connected devices. And we haven’t even touched on content being substituted for an altogether different message (channel hijacking).

Although broadcast networks are generally very secure as they are protected behind firewalls with network address translation functions, the real challenge becomes apparent when a broadcaster wants to stream media to other facilities across an unsecured network such as the internet.

Remote Security

Outside broadcasts require a network connection between the remote event and the broadcast facility. Using the internet is by far the most cost-effective solution as custom video and audio circuits or leased lines are often prohibitively expensive. However, connecting the outside broadcast to the studio through the internet is going to put the media streams at unacceptable risk.

IPsec is a collection of layer-3 protocols dating back to the 1990s that provide two fundamental functions: data integrity and confidentiality. Integrity guarantees the data packets haven’t been tampered with, and confidentiality stops unauthorized people from viewing and recording the data payload, and hence the streamed media. Although the data packets can be seen by anybody, the data in the payload can only be decoded by somebody possessing the necessary keys.

Virtual Private Networks (VPN) are one of the methods that use the IPsec protocols. Not only are they a tried and tested method of providing security, but their use is ubiquitous throughout the internet and has proved their worth.

Encrypting Packets

IPsec VPNs differ from SSL (secure socket layer) protocols as they work at layer-3 of the ISO seven-layer model, as opposed to layer-4 for SSL. In other words, the IP packets themselves are encrypted. Protocols such as SSL encrypt the data that forms the payloads of the TCP layer and hence the IP packets. Although this works well in server-client web page type exchanges, SSL proves ineffective for streaming high-value media as the IP headers are not encrypted leading to the possibility of man-in-the-middle attacks. This is dealt with using HTTPS (Hyper Text Transfer Protocol Secure) but brings a level of overhead and complexity that any broadcaster who is streaming low-latency media will not welcome.

Fundamentally, the IPsec VPN will stop anybody viewing the encrypted media or changing it, assuming the security of the keys is maintained.

Figure 1 – two private networks consisting of the cameras and microphones of the outside broadcast are connected over an IPsec VPN. Although the latency of the VPN is relatively low, it encapsulates each IP packet and encrypts both the header and payload to guarantee integrity and confidentiality of the streamed media. Even if somebody accesses the data in the internet, they will not be able to tamper with the data or view the streamed media.

Figure 1 – two private networks consisting of the cameras and microphones of the outside broadcast are connected over an IPsec VPN. Although the latency of the VPN is relatively low, it encapsulates each IP packet and encrypts both the header and payload to guarantee integrity and confidentiality of the streamed media. Even if somebody accesses the data in the internet, they will not be able to tamper with the data or view the streamed media.

Establishing a VPN is a two-stage process. The first part creates a virtual pathway over the internet between two trusted partners, such as IP routers, allowing private-public keys to be exchanged. These keys are then used during phase 2 to encrypt the IP packets so that any snoopers will only see seemingly random data.

To establish the first stage, the IKE (Internet Key Exchange) phase-1 protocol takes place by initiating a virtual connection. This relies on two trusted devices establishing virtual channels between each other using pre-shared keys. For example, if two Cisco routers are used, one at the OB and the second at the broadcast facility, they will have pre-shared keys that are known to both devices prior to phase-1 connection. A similar system occurs when connecting a laptop computer over a VPN to the office, the software running on the laptop will have a pre-shared key with the corresponding software running on the company’s on-prem VPN server.

During the IKE phase-1 sequence, the policies define the type of information that is shared between the two devices. This often includes the exchange of a second set of public-private keys that are unique to the broadcaster. These are in turn used to create the IKE phase-2 to provide full encryption.

IKE phase 2 forms the main operation of the VPN session by creating a second virtual channel and encrypts all IP packets including the header and the payload. To enable routers and other devices in the network to work with the encrypted IP packets, phase-2 operation adds an IP header to the encrypted packets, and this IP header is in-the-clear.

Changing IP Addresses

It might seem a bit strange that we’ve gone to all the trouble of encrypting the entire IP packet, including the header, and then added the same header to it without encryption. However, this is not always the case as the IP header addresses can change. In figure 1 there are two routers, one at the OB and one at the studio facility. Each of these will have its own IP address for the connecting link to the internet, and it is these IP addresses that are used in the additional IP header. This adds a further level of protection as anybody snooping within the internet will only see the router IP addresses and not the studio or OB cameras and microphones.

Even if the added IP addresses are the same as those in the encrypted IP packet, only devices that have the necessary keys will decode the packet, compare the header to the appended header and, crucially, authenticate the validity. Unauthorized users, however, are unable to change the encrypted header, and so matches between the encrypted and public headers are highly unlikely.

Also, if the header added in phase 2 has been tampered with then it’s unlikely to reach the correct router and will be discarded by other internet routers as they will not have the public-private key that was provided in phase 1 to decode the original IP packet. And if anybody sniffs the packet then they will see the additional header with a payload full of seemingly random data, that is, the encrypted media stream. Only trusted devices that were established during phase 1 will be able to de-cypher the media.

Compliant Routers

This whole process relies on the VPN-enabled routers at both the OB and broadcast facility being correctly configured. Phase 1 is initiated as soon as a media stream with the relevant IP address is sent to the broadcast facility as the OB router will detect the routing and instigate the VPN phase-1 and phase-2 sequences. Phase 2 stays active for as long as the media stream is being sent to the broadcaster and will only close after a predefined time of inactivity, or an initiated VPN close sequence, thus keeping latency through the overhead of VPN setup times relatively low.

The fundamental method of operation when working with the internet is that we assume anybody can see our data and anybody can alter it. Both have potentially serious issues for broadcasters, but they can be easily alleviated by using security protocols such as IPsec VPN as well as two-factor authentication to avoid issues with compromised passwords. This means media streams are free from being viewed by unauthorized people, and we can be sure that the media that was sent at one end is the media that was received at the other.

And just in case you wondered how IPsec-encrypted packets manage to get through firewalls: IPsec traffic usually uses UDP (User Datagram Protocol) to set up dedicated connections, rather than TCP (Transmission Control Protocol).

Part of a series supported by

You might also like...

KVM & Multiviewer Systems At NAB 2024

We take a look at what to expect in the world of KVM & Multiviewer systems at the 2024 NAB Show. Expect plenty of innovation in KVM over IP and systems that facilitate remote production, distributed teams and cloud integration.

NAB Show 2024 BEIT Sessions Part 2: New Broadcast Technologies

The most tightly focused and fresh technical information for TV engineers at the NAB Show will be analyzed, discussed, and explained during the four days of BEIT sessions. It’s the best opportunity on Earth to learn from and question i…

Standards: Part 6 - About The ISO 14496 – MPEG-4 Standard

This article describes the various parts of the MPEG-4 standard and discusses how it is much more than a video codec. MPEG-4 describes a sophisticated interactive multimedia platform for deployment on digital TV and the Internet.

The Big Guide To OTT: Part 9 - Quality Of Experience (QoE)

Part 9 of The Big Guide To OTT features a pair of in-depth articles which discuss how a data driven understanding of the consumer experience is vital and how poor quality streaming loses viewers.

Chris Brown Discusses The Themes Of The 2024 NAB Show

The Broadcast Bridge sat down with Chris Brown, executive vice president and managing director, NAB Global Connections and Events to discuss this year’s gathering April 13-17 (show floor open April 14-17) and how the industry looks to the show e…