Smart-TV security: risk analysis and experiments on Smart-TV communication channels

  • Yann Bachy
  • Vincent Nicomette
  • Mohamed Kaâniche
  • Eric Alata
Original Paper


This paper focuses on the security threats related to smart-TV communication channels. A risk analysis is carried out to have a global view of potential risks that need to be addressed in the context of Smart-TV communication links. The feasibility of several identified risks is investigated experimentally. The experiments show some relevant security-related vulnerabilities on Smart-TV communications channels. Countermeasures to address these vulnerabilities are also investigated.


Smart-TV Risk analysis Security DVB-T and Communication channel 

Supplementary material

11416_2018_320_MOESM1_ESM.png (23 kb)
Supplementary material 1 (png 22 KB)
11416_2018_320_MOESM2_ESM.png (95 kb)
Supplementary material 2 (png 94 KB)
11416_2018_320_MOESM3_ESM.png (8 kb)
Supplementary material 3 (png 7 KB)
11416_2018_320_MOESM4_ESM.png (18 kb)
Supplementary material 4 (png 17 KB)
11416_2018_320_MOESM5_ESM.png (74 kb)
Supplementary material 5 (png 73 KB)
11416_2018_320_MOESM6_ESM.png (12 kb)
Supplementary material 6 (png 11 KB)
11416_2018_320_MOESM7_ESM.png (13 kb)
Supplementary material 7 (png 13 KB)


  1. 1.
    Altinyurt, E.U.: Samygo. (visited on 2015-04-28)
  2. 2.
    Bachy, Y., Basse, F., Nicomette, V., Alata, E., Kaâniche, M., Courrege, J.C., Lukjanenko, P.: Smart-tv security analysis: practical experiments. In: 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 497–504. IEEE (2015)Google Scholar
  3. 3.
    Basse, F.: Sécurité des ordivisions. In: Proceedings of Symposium sur la sécurité des technologies de l’information et des Communications (SSTIC). Rennes, France (2014)Google Scholar
  4. 4.
    Basse, F.: Télévisions connectées : Des objets branchés sécurité ? Multi-System and Internet Security Cookbook (MISC) (2014)Google Scholar
  5. 5.
    Bogdan: Dvb-t implementation in gnuradio? part 2. (visited on 2015-04-28)
  6. 6.
    Chen-Wei, F., Feng-Cheng, C., Hsueh-Ming, H.: An MPEG-4 IPMPX design and implementation on MPEG-21 test bed. In: International Symposium on Circuits and Systems, 2005. ISCAS 2005., vol. 5, pp. 4550–4553 (2005).
  7. 7.
    Cho, Y., Seok, J., Hong, J., Ahn, C.: Broadcasting system compliant with MPEG-2/4 IPMPX. Electron. Telecommun. Res. Inst. J. (ETRI) 26(2), 83–91 (2004)Google Scholar
  8. 8.
    Commission, E.: Special eurobarometer 438: E-communications and the digital single market. (2016). (visited on 2017-09-11)
  9. 9.
    Daemen, J., Rijmen, V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Berlin (2002)CrossRefzbMATHGoogle Scholar
  10. 10. Smart tv sales boost overall european market. (2015). (visited on 2015-10-02)
  11. 11.
    DoctorBeet: Lg smart tvs logging usb filenames and viewing info to lg servers. (2013). (visited on 2015-04-28)
  12. 12.
    European Broadcasting Union: ETSI TS 102 796 V1.2.1 (November 2012)Google Scholar
  13. 13.
    Feamster, N.: Outsourcing home network security. In: Proceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, HomeNets ’10, pp. 37–42. ACM, New York, NY, USA (2010).
  14. 14.
    Ghiglieri, M., Tews, E.: A privacy protection system for hbbtv in smart tvs. In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 357–362 (2014).
  15. 15.
    International Telecommunication Union: Planning criteria, including protection ratios, for digital terrestrial television services in the vhf/uhf bands (2014)Google Scholar
  16. 16.
    Lodge, D.: Is your samsung tv listening to you? (2015). (visited on 2015-10-01)
  17. 17.
    van der Meulen, R., Rivera, J.: Gartner predicts live video broadcasting will be the new “selfie” by 2017. (2014). (visited on 2015-10-02)
  18. 18.
    Michele, B., Karpow, A.: Watch and be watched: Compromising all smart tv generations. In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 351–356 (2014).
  19. 19.
    Oren, Y., Keromytis, A.D.: From the aether to the ethernet—attacking the internet using broadcast digital television. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 353–368. USENIX Association, San Diego, CA (2014).
  20. 20.
    Reimers, U.: The DVB project-digital television for europe. In: DVB (Digital Video Broadcasting): The Future for Television Broadcasting?), IEE Colloquium on (Digest No.1995/142), pp. 1/1–1/7 (1995).
  21. 21.
    Sidiropoulos, N., Stefopoulos, P.: Smart tv hacking. In: Research project 1. Amsterdam, Netherlands (2013).
  22. 22.
    Stott, J.: The dvb terrestrial (dvb-t) specification and its implementation in a practical modem. In: Broadcasting Convention, International (Conf. Publ. No. 428), pp. 255–260 (1996).
  23. 23.
    Weinmann, R.P., Wirt, K.: Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom, chap. Analysis of the DVB Common Scrambling Algorithm, pp. 195–207. Springer US, Boston, MA (2005).

Copyright information

© Springer-Verlag France SAS, part of Springer Nature 2018

Authors and Affiliations

  1. 1.ISAE-SUPAEROToulouseFrance
  2. 2.LAAS-CNRS, Université de Toulouse, CNRS, INSAToulouseFrance

Personalised recommendations