Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security

被引:2
|
作者
Doh, Inshil [1 ]
Chae, Kijoon [1 ]
Lim, Jiyoung [2 ]
Chung, Min Young [3 ]
机构
[1] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Korean Bible Univ, Dept Comp Software, Seoul, South Korea
[3] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon, South Korea
来源
基金
新加坡国家研究基金会;
关键词
Security; User authentication; Mobile open IPTV; Key management; CONDITIONAL ACCESS;
D O I
10.1080/10798587.2014.999430
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Openness has been added to IPTV (Internet Protocol Television) services in order for users not only to receive, but also to provide them. Open IPTV is expected to bring about great changes in the IPTV service area. Recently, mobility has also been added. However, because of its openness and IP network characteristics, security is one of the major issues hindering its commercialization. For IPTV, several security mechanisms for user authentication and content protection have been proposed to make the service reliable. However, these traditional security mechanisms cannot be adopted in the mobile IPTV area, because the security and system performance are influenced by numerous factors in the many-to-many environments. In our work, we propose a mechanism for secure user authentication and key distribution based on Kerberos for mobile open IPTV. Our proposal provides an efficient authentication process and the secure transmission of content among users, and further decreases the authentication time compared with that of other mechanisms.
引用
收藏
页码:543 / 558
页数:16
相关论文
共 50 条
  • [1] A Chaos-based Authentication and Key Management Scheme for M2M Communication
    Boubakri, Wided
    Abdallah, Walid
    Boudriga, Noureddine
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 366 - 371
  • [2] The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment
    Hu, Liang
    Chi, Ling
    Li, Hong-tu
    Yuan, Wei
    Sun, Yuyu
    Chu, Jian-feng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 131 - 146
  • [3] An Authentication and Key Establishment Scheme to Enhance Security for M2M in 6LoWPANs
    Qiu, Yue
    Ma, Maode
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2671 - 2676
  • [4] Authentication for Mobile Open IPTV Service Security
    Lim, Jiyoung
    Doh, Inshil
    Chae, Kijoon
    2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 381 - 385
  • [5] An Associated Behavior Sequence Based User Authentication Approach in M2M Mobile Terminals
    Shi, Congcong
    Du, Miao
    Lu, Weidong
    Lu, Sanglu
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [6] A Distributed Authentication and Key Exchange Approach for Secure M2M Communications
    Murthy, B. Satyanarayana
    Sumalatha, L.
    PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 277 - 280
  • [7] A Study on Key Distribution Protocol with Mutual Authentication for M2M Sensor Network
    Jung, Sungmo
    Ahn, Jae Young
    Hwang, Dae-Joon
    Kim, Seoksoo
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (03): : 1229 - 1240
  • [8] Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
    Coruh, Ugur
    Bayat, Oguz
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [9] M2M Security Technology of CPS Based on Blockchains
    Yin, Shiyong
    Bao, Jinsong
    Zhang, Yiming
    Huang, Xiaodi
    SYMMETRY-BASEL, 2017, 9 (09):
  • [10] Token-based authentication method for M2M platforms
    Polat, Huseyin
    Oyucu, Saadin
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (04) : 2956 - 2967