Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security

被引:2
|
作者
Doh, Inshil [1 ]
Chae, Kijoon [1 ]
Lim, Jiyoung [2 ]
Chung, Min Young [3 ]
机构
[1] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Korean Bible Univ, Dept Comp Software, Seoul, South Korea
[3] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon, South Korea
来源
基金
新加坡国家研究基金会;
关键词
Security; User authentication; Mobile open IPTV; Key management; CONDITIONAL ACCESS;
D O I
10.1080/10798587.2014.999430
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Openness has been added to IPTV (Internet Protocol Television) services in order for users not only to receive, but also to provide them. Open IPTV is expected to bring about great changes in the IPTV service area. Recently, mobility has also been added. However, because of its openness and IP network characteristics, security is one of the major issues hindering its commercialization. For IPTV, several security mechanisms for user authentication and content protection have been proposed to make the service reliable. However, these traditional security mechanisms cannot be adopted in the mobile IPTV area, because the security and system performance are influenced by numerous factors in the many-to-many environments. In our work, we propose a mechanism for secure user authentication and key distribution based on Kerberos for mobile open IPTV. Our proposal provides an efficient authentication process and the secure transmission of content among users, and further decreases the authentication time compared with that of other mechanisms.
引用
收藏
页码:543 / 558
页数:16
相关论文
共 50 条
  • [21] A Dynamic-Encryption Authentication Scheme for M2M Security in Cyber-Physical Systems
    Chen, Shuo
    Ma, Maode
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 2897 - 2901
  • [22] A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks
    Qiu, Yue
    Ma, Maode
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (06) : 2074 - 2085
  • [23] Security Challenges and Attacks in M2M Communications
    Imani, Amirhosein
    Keshavarz-Haddad, Alireza
    Eslami, Mohsen
    Haghighat, Javad
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 264 - 269
  • [24] An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application
    Jeon, You-Boo
    Lee, Keun-Ho
    Park, Doo-Soon
    Jeong, Chang-Sung
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [25] GSL-AKA: Group-based Secure Lightweight Authentication and Key Agreement Protocol for M2M Communication
    Modiri, Mohammad Mahdi
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 275 - 280
  • [26] Research on the Key Technology of M2M Gateway
    Liu, Lianru
    Gu, Minxia
    Ma, Yan
    HUMAN CENTERED COMPUTING, HCC 2014, 2015, 8944 : 837 - 843
  • [27] Security Analysis Based on Trusted Environment (TRE) of M2M/IoT
    Urunov, Khamdamboy
    Namgung, Jung-Il
    Park, Soo-Hyun
    2015 17TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM APNOMS, 2015, : 554 - 557
  • [28] M2M: From Mobile to Embedded Internet
    Wu, Geng
    Talwar, Shilpa
    Johnsson, Kerstin
    Himayat, Nageen
    Johnson, Kevin D.
    IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (04) : 36 - 43
  • [29] Open M2M Data - Position Paper
    Coskun, Hakan
    Pfeifert, Tom
    Elmangosht, Asma
    Al-Hezmi, Adel
    PROCEEDINGS OF THE 2013 38TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS), 2013, : 904 - 911
  • [30] Capability-Based Access Control with ECC Key Management for the M2M Local Cloud Platform
    Anggorojati, Bayu
    Prasad, Neeli Rashmi
    Prasad, Ramjee
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (02) : 519 - 538