Secure Key Exchange Scheme for IPTV Broadcasting

被引:0
|
作者
Pippal, Ravi Singh [1 ]
Tapaswi, Shashikala [1 ]
Jaidhar, C. D. [2 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior, India
[2] Def Inst Adv Technol, Pune, Maharashtra, India
来源
关键词
cryptography; IPTV; mutual authentication; nonce; smart card; STB;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In Internet Protocol Television (IPTV) broadcasting, service providers charge subscription fee by scrambling the program in Conditional Access System (CAS). This avoids unauthorized users to receive the programs. A smart card (CA card) is used to decrypt the Control Words (CWs) and transfer them back to Set-Top Box (STB) in order to deseramble the scrambled program. This paper presents a secure mutual authentication and key exchange scheme between STB and smart card for IPTV broadcasting. Its security is based on one way hash function and the discrete logarithm problem. It allows subscribers to choose and change the password freely, provides dynamic session key agreement and mutual authentication between STB and smart card. Security analysis proves that the scheme is strong against subscriber and STB impersonation attacks, replay attack, stolen verifier attack, smart card loss attack, man-in-the-middle attack and attack on perfect forward secrecy which are considered as common threats in IPTV environment. Moreover, the scheme also prevents serious attacks such as smart card cloning and McCormac Hack attack particular to authentication using smart cards.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [31] Key Management Approach for Secure Mobile Open IPTV Service
    Doh, Inshil
    Lim, Jiyoung
    Chae, Kijoon
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 843 - 864
  • [32] Alternating (AC) Loop Current Attacks Against the KLJN Secure Key Exchange Scheme
    Melhem, Mutaz Y.
    Chamon, Christiana
    Ferdous, Shahriar
    Kish, Laszlo B.
    FLUCTUATION AND NOISE LETTERS, 2021, 20 (06):
  • [33] An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment
    Ashish Tomar
    Joydip Dhar
    Wireless Personal Communications, 2019, 107 : 351 - 372
  • [34] An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment
    Tomar, Ashish
    Dhar, Joydip
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (01) : 351 - 372
  • [35] GENERALIZED DC LOOP CURRENT ATTACK AGAINST THE KLJN SECURE KEY EXCHANGE SCHEME
    Melhem, Mutaz Y.
    Kish, Laszlo B.
    METROLOGY AND MEASUREMENT SYSTEMS, 2019, 26 (04) : 607 - 616
  • [36] Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting
    Yi, Xun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) : 303 - 304
  • [37] A Secure Multicast Key Agreement Scheme
    Chen, Hsing-Chung
    Chen, Chung-Wei
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 275 - 281
  • [38] Secure Opportunistic Multipath Key Exchange
    Costea, Sergiu
    Choudary, Marios O.
    Gucea, Doru
    Tackmann, Bjorn
    Raiciu, Costin
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2077 - 2094
  • [39] Optimal key scheduling for secure satellite broadcasting to mobile users
    Di Pietro, Roberto
    Iannitti, Stefano
    PROCEEDINGS OF THE 2006 INTERNATIONAL WORKSHOP ON SATELLITE AND SPACE COMMUNICATIONS: FUTURE SATELLITE COMMUNICATION: NEW SYSTEMS, PROTOCOLS AND SERVICES, 2006, : 34 - 38
  • [40] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8