Secure Key Exchange Scheme for IPTV Broadcasting

نویسندگان

  • Ravi Singh Pippal
  • Shashikala Tapaswi
  • Jaidhar C. D.
چکیده

In Internet Protocol Television (IPTV) broadcasting, service providers charge subscription fee by scrambling the program in Conditional Access System (CAS). This avoids unauthorized users to receive the programs. A smart card (CA card) is used to decrypt the Control Words (CWs) and transfer them back to Set-Top Box (STB) in order to descramble the scrambled program. This paper presents a secure mutual authentication and key exchange scheme between STB and smart card for IPTV broadcasting. Its security is based on one way hash function and the discrete logarithm problem. It allows subscribers to choose and change the password freely, provides dynamic session key agreement and mutual authentication between STB and smart card. Security analysis proves that the scheme is strong against subscriber and STB impersonation attacks, replay attack, stolen verifier attack, smart card loss attack, man-in-the-middle attack and attack on perfect forward secrecy which are considered as common threats in IPTV environment. Moreover, the scheme also prevents serious attacks such as smart card cloning and McCormac Hack attack particular to authentication using smart cards.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key management approach for secure mobile open IPTV service

In mobile open Internet Protocol TV (IPTV) which is one of the major attracting technologies recently, the security is a key issue for reliable service, because the mobility and the openness in IPTV could cause much more vulnerabilities to various attacks compared with traditional IPTV services. In this paper, we propose an energyefficient and secure channel group key establishment and rekeying...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Video Casting Application Oriented Key Exchange

Within video stateless receivers, a central server should deliver information securely to the authorized users, over a public channel, even if receivers do not update their state from session to session. This is the case of a multimedia conditional access systems based on one way broadcasting. This paper suggests a new approach to assure a secure communication in such environments. The proposed...

متن کامل

On next-generation telco-managed P2P TV architectures

In recent years, Telcos worldwide have deployed IPTV networks to offer cable TV-like services over the IP backbones. Such walled garden IPTV networks are provisioned to guarantee the quality of service, fast channel switching, and user experience expected by TV viewers. A common key design element of these networks is the use of IP multicast within a single network domain in broadcasting of sev...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Informatica (Slovenia)

دوره 36  شماره 

صفحات  -

تاریخ انتشار 2012