A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack
نویسندگان
چکیده
منابع مشابه
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
As the most prevailing two-factor authentication mechanism, smart card based password authentication has been a subject of intensive research in the past decade and hundreds of this type of schemes have been proposed. However, most of them were found severely flawed, especially prone to the smart card security breach problem, shortly after they were first put forward, no matter the security is ...
متن کاملSOC Design for IPTV Set Top Box
IPTV is mainly used for Live Streaming, Time Shifting and provide Videos on Demand (VOD). In recent years of development in System on Chip (SOC) design the Ethernet transmission capability is 100Mbps.The data transmitted is in the form of packets through the Ethernet cable. This packet has to be converted into frames and stored in the memory. Generally, processor accesses the memory and stores ...
متن کاملA Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance
Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestampbased remote user authentication scheme to eliminate the attacks in Shen et al.’s. However, we find that their scheme is vulnerable to the privileged insider, the lost smart card, the password guessing, the replay, the modifica...
متن کاملRobust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting
Secure communication between set-top boxes (STBs) and smart cards is directly related to the benefit of the service providers and the legal rights of users, while key exchange is the essential part of a secure communication. In 2004, Jiang et al. proposed a key exchange protocol for STBs and smart cards based upon Schnorr’s digital signature protocol and a one-way hash function. This paper, how...
متن کاملA Robust Remote User Authentication Scheme against Smart Card Security Breach
Remote user authentication is important to identify whether communicating parties are genuine and trustworthy using the password and the smart card between a login user and a remote server. Recently, we find that Kim et al.’s password-based authentication scheme [1] assume that the attacker cannot extract the secret information of the smart card. However, in reality, the authors in [2,8] show t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartC
سال: 2010
ISSN: 1598-2858
DOI: 10.3745/kipstc.2010.17c.1.037