Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security

被引:2
|
作者
Doh, Inshil [1 ]
Chae, Kijoon [1 ]
Lim, Jiyoung [2 ]
Chung, Min Young [3 ]
机构
[1] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Korean Bible Univ, Dept Comp Software, Seoul, South Korea
[3] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon, South Korea
来源
INTELLIGENT AUTOMATION AND SOFT COMPUTING | 2015年 / 21卷 / 04期
基金
新加坡国家研究基金会;
关键词
Security; User authentication; Mobile open IPTV; Key management; CONDITIONAL ACCESS;
D O I
10.1080/10798587.2014.999430
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Openness has been added to IPTV (Internet Protocol Television) services in order for users not only to receive, but also to provide them. Open IPTV is expected to bring about great changes in the IPTV service area. Recently, mobility has also been added. However, because of its openness and IP network characteristics, security is one of the major issues hindering its commercialization. For IPTV, several security mechanisms for user authentication and content protection have been proposed to make the service reliable. However, these traditional security mechanisms cannot be adopted in the mobile IPTV area, because the security and system performance are influenced by numerous factors in the many-to-many environments. In our work, we propose a mechanism for secure user authentication and key distribution based on Kerberos for mobile open IPTV. Our proposal provides an efficient authentication process and the secure transmission of content among users, and further decreases the authentication time compared with that of other mechanisms.
引用
收藏
页码:543 / 558
页数:16
相关论文
共 50 条
  • [31] Capability-Based Access Control with ECC Key Management for the M2M Local Cloud Platform
    Bayu Anggorojati
    Neeli Rashmi Prasad
    Ramjee Prasad
    Wireless Personal Communications, 2018, 100 : 519 - 538
  • [32] Application-based Identity Management in M2M System
    Fu, Zhonglin
    Jing, Xiaojun
    Sun, Songlin
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, IET AIAI2011, 2011, : 211 - 215
  • [33] Terminal Authentication in M2M Communications in the Context of Internet of Things
    Ranjan, Aditya Kaushal
    Hussain, Muzzammil
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 34 - 42
  • [34] GBS-AKA: Group-based Secure Authentication and Key Agreement for M2M in 4G Network
    Yao, Jiming
    Wang, Tao
    Chen, Mingkai
    Wang, Lei
    Chen, Gejuan
    2016 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION - ICCCRI 2016, 2016, : 42 - 48
  • [35] Key Management Approach for Secure Mobile Open IPTV Service
    Doh, Inshil
    Lim, Jiyoung
    Chae, Kijoon
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 843 - 864
  • [36] A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems
    Nguyen, Tien-Dung
    Huh, Eui-Nam
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (06) : 511 - 519
  • [37] Detecting M2M Traffic in Mobile Cellular Networks
    Laner, Markus
    Svoboda, Philipp
    Rupp, Markus
    21ST INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2014), 2014, : 159 - 162
  • [38] Chip Helps Manage M2M Mobile Communications
    Whytock, Paul
    MICROWAVES & RF, 2010, 49 (02) : 26 - 26
  • [39] Modelling of a MAC Protocol for Mobile M2M Communications
    Mehmet-Ali, Mustafa
    Ghazvini, Farshad Keyvan
    Doughan, Mahmoud
    2017 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2017,
  • [40] Device management for M2M and IoT applications
    Yoshihara, Kiyohito
    Hattori, Masaharu
    Journal of the Institute of Electronics, Information and Communication Engineers, 2016, 99 (01): : 42 - 46