Dedicated Micros' Closed IPTV solution is a key focus for the company at IP Expo
Dedicated Micros' Closed IPTV solution is a key focus for the company at IP Expo
Mike Newton, founder of CCTV specialist Dedicated Micros - part of AD Group - takes a closer look at the company's award-winning Closed IPTV solution which is a key focus for Dedicated Micros at IP EXPO, the UK's largest end-to-end IT infrastructure event, being held from 20-21 October at Earls Court 2 in London.

In essence Closed IPTV, which I was instrumental in creating, has been brought to market to deliver all of the simplicity and security of a traditional CCTV installation to the IP environment. From a security perspective the fact that, with Closed IPTV, each connected IP camera is locked down within a private network and, crucially, that trusted IP end points can be created, closes the door to those looking to use this as a route to hack into the corporate network. Also, from a practical perspective, there is no longer the frustration of having to manually assign individual IP addresses where mistakes can unwittingly introduce vulnerabilities.

Looking in more detail at how our patent-pending, Closed IPTV, is configured in practice, it uses a completely deterministic set-up which automatically maps each, standard or HD resolution, IP camera to a specific port on Dedicated Micros' Layer 3 Enhanced CCTV Switch and, in turn, to the corresponding camera input number on a hybrid DVR/NVR (Digital Video Recorder/Network Video Recorder). This approach, combined with DM's unique implementation of secure modes means that, when it comes to IP video, complete security of the IP endpoints can be achieved by users with a single click so preventing potentially damaging hacking attacks.

At Dedicated Micros we are currently rolling out Closed IPTV in a number of product lines with one of the first being a version of the hybrid SD Advanced DVR/NVR which is on display at IP EXPO.

Closed IPTV offers ease of installation and key benefits to far more than the user or installer who may be afraid of ‘setting a few IP addresses'

Turning to some typical questions regarding Closed IPTV:

Q1 - Does Dedicated Micros' Closed IPTV technology only have a short term appeal to those afraid of IP Video?

Dedicated Micros believes this is not the case. Closed IPTV offers ease of installation and key benefits to far more than the user or installer who may be afraid of ‘setting a few IP addresses'. While simple segregated IPTV solutions have been implemented, they are often open to attack compromising the video being delivered, and many of the benefits are lost from the segregation as soon as access is shared with the general network.

The Closed IPTV solution we are bringing to market is far more than just a simple discovery scheme as proposed by others in the marketplace which offer little more than a custom DHCP (Dynamic Host Configuration) server, which updates system parameters when the IP address is dynamically re-allocated, and no other system protection. In particular, Closed IPTV addresses segregation of the IP system while still allowing access as required direct to the cameras, for Multicast as an example.

If IP Camera systems are going to offer genuine benefits over IP Video enabled analogue solutions this will only be achieved if the IP connectivity of the cameras themselves can be leveraged to improve Return On Investment (ROI) otherwise the IP technology is just an alternative, and more complex, transport medium. It is short sighted for people to claim a limited appeal for Closed IPTV until the full sophistication and advantages are fully understood.

Q2 - Does Closed IPTV lock you in to proprietary protocols?

No, Closed IPTV provides increased ease of installation and security depending on the equipment used. The Layer 3 Enhanced CCTV Switch functionality, combined with the Dedicated Micros' NVR provides basic deterministic solutions which operate with any IP products, and in the majority of cases will give enhanced security capabilities at either VLAN (Virtual Local Area Network) or MAC (Media Access Control) access control list level, with little user intervention.

Closed IPTV provides increased ease of installation and security

However when used with Dedicated Micros' products significant extra advantages are enabled, with fully automated IP discovery and allocation with transparent default  configurations and setup options. Further enhancements such as ‘Trusted Endpoint' technology are only realised with Dedicated Micros' products.

Q3 - Are the security techniques of Closed IPTV proprietary, and hence unfamiliar or unwelcome to many users?

The proprietary systems utilised are firstly targeted at the physical layer, through the Layer 3 Enhanced CCTV Switch employed. This removes much of the burden of achieving in a single user operation, MAC ACL and VLAN restrictions which would otherwise have to be implemented by a specialist installer with significant additional effort.

The IP scheme is unique in that it allows a general Private Network Address range, as operated in the client's existing installation, to potentially operate concurrently with an auto configured address scheme. Once configured, it is the user's choice to rely upon the DHCP/Static generated addresses, or the automatic configuration addresses, or in fact both. This is implemented using dual MAC / VLAN techniques, transparently supported by the Layer 3 Enhanced CCTV Switch.

The further implementations of ‘Trusted Endpoint' in Closed IPTV are specifically designed to meet the unusual needs of CCTV, in that the key benefit of TCP/IP on the World Wide Web is specifically non-deterministic, and when secure connections are required, it is typical that the client is in an insecure location, and the server protected in a secure location.

For CCTV we specifically demand that the connection to the camera is unequivocal as a physical device, with deterministic knowledge of its location, and that the ‘servers', i.e. the cameras, are typically located outside the protected area, and the user is typically inside the protected area. This requires bespoke and focused solutions, rather than the general case of the World Wide Web.

Q4 - Is the Layer 3 Enhanced CCTV Switch used in Closed IPTV custom to Dedicated Micros and does it support PoE (Power over Ethernet)?

Yes, the switch is a custom device, heavily integrated into the NVR user interface to allow the specific and key goals to be achieved in the required environment for CCTV. It supports dual address ranges and VLANS, as well as the various additional security protocols. While the maximum benefit is achieved with NetVu Connected devices from Dedicated Micros, it will also provide basic benefits for any IP camera, to much the same level as can typically be achieved by a number of hours of custom configuration of an ‘off the shelf' layer 2 or 3 switch.

The further implementations of ‘Trusted Endpoint' in Closed IPTV are specifically designed to meet the unusual needs of CCTV

All the NetVu Connected parts are available in PoE (Power over Ethernet) versions, and the only unconfirmed date is the exact production scheduled build of the PoE versions of the Layer 3 Enhanced CCTV Switch. First production quantities of the non PoE version are now available, with full approval and availability of the PoE version anticipated before the end of the calendar year. All NetVu Connected PoE capable cameras will additionally be shipped with a passive PoE injector.

Q5 - With Closed IPTV does the proprietary nature of the discovery 'lock you in', and why not just spend a few days writing scripts to achieve the same thing?

Again the base layer of Closed IPTV utilises zeroconf as one of the more universal discovery schemes, supported by many devices, and likely to be the most popular solution under PSIA and ONVIF. It is the further deterministic solution of Closed IPTV that easily delivers the security advantages as well, which it is likely that while such scripts may enhance discovery, they do little for enhancing security. The basis of all open standards is that the fundamental lower layers should be non-proprietary to achieve common ground and interoperability. It is however the enhancements at the higher layers that deliver the unique benefits and strengths of a solution, otherwise no one would be able to deliver an enhanced, bespoke solution. Closed IPTV completely fulfils those goals and delivers them with a few key strokes, rather than days or weeks of writing custom scripts, assuming this knowledge is held. 

Q6 - Is 'closing' IP cameras an inefficient approach to gain simplicity?

Most certainly not. It is important not to confuse ‘Closed IPTV' with restrictive proprietary protocols. The usage of Closed IPTV is highly efficient, as with little installer overhead the following is achieved:

  • Deterministic allocation and configuration, combined or independent of the client's wider DHCP or other addressing scheme.
  • VLAN level security protocols without the user even having to be aware that multiple and sophisticated VLANS have been implemented.
  • MAC level security ACL's, again without the user even being aware of the MAC addresses of the devices used.
  • Endpoint to Endpoint segregation, blocking access of any other IP camera from an unprotected endpoint.
  • Full monitoring and protection against 'Man in the Middle' attacks, such as ARP (Address Resolution Protocol) storms, without any user configuration and intervention.
  • Interoperability with other IP vendors, to the extent of the capabilities of that camera.
  • "Trusted Endpoint" technology ensuring in an absolutely deterministic manner that the device connected physically to the port, and configured as a device to a specific channel is the device unaltered with no intermediate device.
  • Both secure signature and optional encryption of the streams to a unique key generated when the system solution is secured, to both protect data from eavesdropping or interception and ensure that the validity and integrity of the data received can be assured.

This is all achieved by utilising the Layer 3 Enhanced CCTV Switch, and selecting two or three options with the ‘Closed IPTV - Lock Down' menu. This is certainly not inefficient, and achieves much improved secure scenarios than many alternative environments.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Securing your business while working remotely
Securing your business while working remotely

It's a very common purchase for people to seek a smart security camera to remotely link them to their home whilst at work. Now the emphasis has shifted, with a lot more people working from home, business owners should consider a surveillance device to deter would-be thieves, protecting valuable equipment crucial for businesses to operate successfully. A robust security camera setup can aid existing security staff, and give business owners peace of mind out of hours.    According to a recent report, police forces are having to carry out extra night patrols in empty city and town centres, as burglars target shops, pubs and other commercial premises during the pandemic. During these unprecedented times, investing in a video security system can save you and your business money – and in more than one way. In addition to preventing loss of property from inside, surveillance cameras also prevent acts of theft and vandalism by outside individuals However, technology, improved mobile connectivity, apps, and cloud technologies has changed the security market and made it easy for anyone to set up a surveillance ecosystem with easy installation and constant round the clock, cloud monitoring. Plus, you can access footage from anywhere in the world via devices and apps – just in case you have to skip the country! The best cameras for SMBs Most good cameras have the much same functionality: excellent video and audio capabilities, remote access and programming, motion and sound detection, and the ability to capture still or video images and audio and save the data to the Cloud. But the burning question is, when you're trying to find a need in a haystack, what will work best for a small to medium sized business? A robust security camera setup can aid existing security staff, and give business owners peace of mind out of hours Now you can buy cameras that come packed with features such as integrated night vision, 1080p resolution, microSD card slot for local recording, two-way audio functionality as well as the latest latest 128bit encryption. They also have wide-angle lenses allowing users to see more of their office with a single camera, and some come with free, intelligent AI-Based motion detection. The AI gives users more choices on what is captured by the camera and when they should be alerted. Users can specify what types of motion they would like to detect, such as an intruder as opposed to a dog, an object crossing a defined boundary or into a specific area. They can also define multiple zones, alerting them immediately when movement is detected in particular areas. Easy installation is crucial These security cameras should also be easy enough to install and use that you don't need to fork out for expensive expert installation, and many can work with existing CCTV and CCTV DVR systems you may already have set-up. Many of the business security cameras are Wi-Fi enabled and come with their own apps, so you can view footage on your smartphone or tablet, no matter where you are in the world. It means you don't need to pay for a security team to watch the footage at all times (though if you can afford it, that won't hurt), and you can store your videos locally with an NVR on a HD, in the cloud with mydlink or do both with a hybrid NVR/cloud recorder. The apps use Rich Notifications which send a push notification with snapshot to the mobile device the moment activity is detected. Users can react immediately without the need to log into the app by accessing the camera’s live view or calling one of two pre-assigned contacts with a single tap. Any motion-triggered recordings can be saved in the cloud, or locally on a microSD card. Indoor, Outdoor or both? Indoor cameras can be smaller, more lightweight and are usually less intrusive than bulkier outdoor cameras The primary distinction between indoor and outdoor security cameras is the types of external factors each camera has to be able to withstand. While both types of cameras usually come in similar styles and with comparable features, outdoor cameras need to be able to contend with all types of weather and varying light conditions. Outdoor cameras are also more vulnerable to being tampered with, so they are typically made of more durable materials, like metal, and may be heavier or even housed in a casing in order to discourage easy removal. Indoor cameras can be smaller, more lightweight and are usually less intrusive than bulkier outdoor cameras. Both indoor and outdoor cameras utilise features like infrared, allowing for clear pictures in low light conditions and easy transitions when there is a sudden change in light-changing automatically from colour images in bright light to black and white when it gets darker. When doing your research, features to look out for include: Wide angle lens for optimum room view or full view of the front of your property Full HD 1080p at 30fps   ONVIF compatible - Open Network Video Interface Forum - The forum aims to standardize how IP products within the video surveillance industry communicate with each other. Night vision - look at length of the night vision - 5m is about right Your options will depend on your budget and specific needs, but the above features are a great start when you come to buy.

The future of property security: In-house processing units versus cloud-based video surveillance systems
The future of property security: In-house processing units versus cloud-based video surveillance systems

Nowadays, everything seems easier in the matter of surveillance. Sophisticated technology safeguards our valuables for us without asking for anything in return. But what if it’s not true? What if it comes with a price? Video surveillance systems are a popular way to keep the property under constant control. It’s not rare that the technological sophistication of these systems puts us in awe. They make us feel, and be, safe. Yet, there are doubts when it comes to ensuring privacy. And these worries are understandable. Privacy abusers wait around every corner. Some of the fish for data coming from our monitoring systems. Should we then give up and go back to the in-person property guarding? Not really. Countless advantages make an intelligent video surveillance system worth trying. How to find the best solution within the video surveillance systems? Which system is the most secure in protecting us from the threats of privacy abuse: in-house processing unit, or the cloud? Desire for safety Every human wants to feel safe. At the bottom of Maslow's "Needs Hierarchy," there are two most essential points. We desire to fulfill our physiological necessities - the need for food, water, warmth, and rest. In the second place, also fundamental is a need for security.Security doesn’t only mean keeping burglars away from the property Today's fast-paced world changes its outer expression, yet the significance of security is constant. We crave to feel safe and we are ready to do a lot to achieve it.  The core truth to begin with when it comes to security is its definition. Security doesn’t only mean keeping burglars away from the property. If it did, we would be content with any camera surveillance system, regardless of its privacy threats. The issue is more complex. Humans value their privacy. Not only keeping our valuables safe but also being away from the sight of others matters to us. We put efforts to protect our privacy, whether it comes to houses, businesses, or sensitive data. Data privacy Why is it so important? Ongoing cases of privacy invasions prove that data finds "new owners" very fast. These data takeovers can result in a major inconvenience and robbery on a large scale. Main privacy threats are information collection, processing, dissemination, and invasion. We want to protect data obtained by video surveillance systems. Privacy and security are sometimes compared to water and oilThese are, for example, video registrations, times of entrance to the property, number and identities of visitors, etc. Privacy and security are sometimes compared to water and oil. They say you can have security but you’ll lose privacy. They say you can have privacy, but you’ll lose security. These common convictions inspired a new generation of companies to create privacy-first security solutions. They are, in other words, security systems focused on not sacrificing privacy. Cloud-based systems Most of the time, popular video surveillance systems but at the same time insecure when it comes to privacy are running on the cloud. There has been a long discussion about its safety and it continues to raise privacy concerns. These systems too often fail in ensuring privacy, and they are vulnerable to hacking. Ring, Nest, and other home security companies experienced compromising mishaps on a large scale. It's not a secret that some cloud-based companies partner up with police departments. Also, if your data is too available, tech companies can sell it to advertisers.Data uploaded onto the cloud is exposed for anyone to meddle with Data uploaded onto the cloud is exposed for anyone to meddle with. According to the book The Age of Surveillance Capitalism_ The Fight for a Human Future at the New Frontier of Power by Shoshana Zuboff “Nest takes little responsibility for the security of that information and none for how other companies will put it to use. In fact, University of London legal scholars Guido Noto La Diega and Ian Walden, who analysed these documents, reckon that were one to enter into the Nest ecosystem of connected devices and apps, each with their own equally burdensome terms, the purchase of a single home thermostat entails the need to review nearly a thousand contracts.” Security and privacy vanish once a smart home system enables remote access. In-house processing units It all leads to the conclusion that keeping data in the in-house processing unit is safer and more private. It keeps us away from the eyes of governments, corporates, advertisers, and hackers. And since the market is proactive, solutions in that department came fast. Thanks to the advances to the internet of things (IoT), edge computing, and machine learning, it will be possible in the near future to find different surveillance private-secure systems on the market. A privacy-centered "architecture" processes and stores camera footage inside the propertyThey will combine the most advanced technology with sophisticated privacy protection. In the in-house option, a privacy-centered "architecture" processes and stores camera footage inside the property. For example, one Seattle-based startup is working on a solution that uses specialised IP cameras that work in groups with an edge computing device. An AI (artificial intelligence) algorithm analyses all the footage taken by the cameras. Once it detects anomalies, it notifies the final user. Those systems don't upload any of the customers' data to the cloud, they keep privacy and all the information at the customer's home. The in-house processing unit can learn to differentiate what its user marks as important. The system captures and saves only those pieces of information. Smart surveillance systems To give an example: users who wish to know when their dog is outside can set the cameras to detect it. If they wish to turn a blind eye to burglars, they are free to do it. Smart surveillance systems work with facial matching and pose detection technology. They can detect individuals that haven’t logged on to the system. This tool respects an ethical protocol. It isn’t sensitive to a specific gender, race, or age. Its purpose is to detect behavior identified as suspicious without targeting individual identities. By identifying people who aren’t a part of your daily routine, the system cuts any kind of security risk. The in-house processing unit video surveillance systems "do the watching" for you. The newest in-house processing unit video surveillance systems will sharpen the feature of crucial importance - privacy protectionThat revolutionises the way we think about security. The system that integrates all the security visual sensors into the “brain” of the system is the smartest and safest idea on the market. This “brain” later decides whether to notify the user about the potential danger or let it go. It deletes every irrelevant piece of data on the spot. This kind of cognitive machinery saves both your time and bandwidth. Thanks to them, you get rid of unnecessary alerts. The newest in-house processing unit video surveillance systems will sharpen the feature of crucial importance - privacy protection. The newest technology offers a plenitude of sophisticated surveillance methods. Our task is to choose the right one. The one that not only protects our properties and valuables but also our privacy. 

Key considerations for robust residential security
Key considerations for robust residential security

In the UK, one burglary occurs every 106 seconds. This means by the time you've finished reading this article, at least three will have taken place. Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates and deter opportunistic intruders. With 58% of burglaries said to take place while the homeowner is in, it seems that even the second wave of lockdowns, and an increased number of people confined to their homes, won't do much to eliminate the risk of burglary. Prioritise security for peace of mind Security is paramount, and in the case of new build projects, should be considered from the very beginning of the design process, not as an afterthought. When it comes to securing pre-existing buildings, there are countless security options which will ensure the perimeter is robust enough to withstand opportunistic attacks. It's also worth noting that security features don't have to be complicated. There are plenty of high-tech digital systems flooding the market, which can go a long way to reduce the risk of burglary and will provide peace of mind to the end user. However, this article will demonstrate how traditional security measures, such as high-quality perimeter fencing, can ensure practical safeguarding of properties for years to come.  Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates Timber! There are a number of different materials which can be specified to create a strong boundary. From metal railings, to timber fence panels, they will each help deter criminals somewhat. Wooden fence panels are a popular choice for their appearance, and the right product and installation can help to increase security.Our timber acoustic fencing can also reduce noise by up to 32dB and has a solid face with no hand or footholds, while still retaining the attractive natural timber aesthetic of a typical garden fence. However, maintenance is key, and one of the first thing burglars will notice is the condition a fence is in, rather than a particular style. Therefore, old, broken or rotten fence panels are a green light for opportunistic thieves. These can be easily broken or bypassed with minimal effort. When specifying fences as part of a new build housing development, we would suggest opting for high-quality timber, as this will ensure that it is protected against rot. Look for products with an extended guarantee or those that don't need additional treatment over the years. The condition of the fence should still be regularly inspected, and simple methods such as clearing piles of leaves away from the base of the boundary can help to prevent rot which weakens the timber.  Securing fence panels The recent rising cost of timber has led to a dramatic increase in fence panel theft, and panels that can be lifted from the posts are an easy target. Mitigate this risk by screwing the fence panels into the posts. This makes it much harder for the panels to be removed from the posts and creates a more secure barrier.  Concrete posts do offer benefits, but we always advise on timber posts for any fencing. They're strong, just like concrete, but they continue the same natural theme as the rest of the fence. Moreover, if you screwed the panels to concrete posts, they would most likely crack and become damaged, and then be at risk to the elements.  Astute design Design is also important. Installing fence rails on the inside of properties to prevent them from being used as climbing aids is highly recommended. Even better, using panels without rails on high-end developments is a clever tip if you want a secure fence with a high-spec look. Security features don't have to be complicated High fences with solid panels and no gaps in between make it considerably harder for potential burglars to climb over. They also offer better privacy to conceal rear garden areas from intruders, and are much sturdier than other alternative panels.  One common mistake is designing in features such as trees or children's climbing frames too close to the boundary. These can be used by burglars as climbing aids when attempting to scale the fence, making access easy. Investigate the surrounding area, which flanks the outside of the property boundary, as an unfortunately placed bin or bench can also help criminals gain entry. If the removal of these items is not possible, designing in a spiky bush can help deter intruders. It's also worth noting that gardens with numerous large features such as bushes or sheds can also negatively impact the level of security. A clear line of sight across the entire garden is highly recommended where possible. If this view is blocked, it's considerably easy for intruders to hide undetected. Front gardens  While tall, solid fence panels are recommended for rear gardens to prevent intruders from being able to see in and climb over, the opposite is true for front gardens. For street-facing gardens, a low fence or hedge is recommended to provide a clear view from the house. It also makes it much harder for intruders to hide from passers-by or neighbours, who can raise the alarm during a burglary. Another useful security technique to consider is a gravel drive. These create noise, which means the homeowner will know when it is in use. Pair this with a strong boundary fence, the likelihood of burglary dramatically decreases. This article only scratches the surface in unveiling the sheer volume of effective home security options on offer to protect homes and gardens. These investments can help minimise the risk of traumatic break-ins, while also simultaneously boosting the aesthetic of the property and its surroundings.