Secure Key Exchange Scheme for IPTV Broadcasting

被引:0
|
作者
Pippal, Ravi Singh [1 ]
Tapaswi, Shashikala [1 ]
Jaidhar, C. D. [2 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior, India
[2] Def Inst Adv Technol, Pune, Maharashtra, India
来源
关键词
cryptography; IPTV; mutual authentication; nonce; smart card; STB;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In Internet Protocol Television (IPTV) broadcasting, service providers charge subscription fee by scrambling the program in Conditional Access System (CAS). This avoids unauthorized users to receive the programs. A smart card (CA card) is used to decrypt the Control Words (CWs) and transfer them back to Set-Top Box (STB) in order to deseramble the scrambled program. This paper presents a secure mutual authentication and key exchange scheme between STB and smart card for IPTV broadcasting. Its security is based on one way hash function and the discrete logarithm problem. It allows subscribers to choose and change the password freely, provides dynamic session key agreement and mutual authentication between STB and smart card. Security analysis proves that the scheme is strong against subscriber and STB impersonation attacks, replay attack, stolen verifier attack, smart card loss attack, man-in-the-middle attack and attack on perfect forward secrecy which are considered as common threats in IPTV environment. Moreover, the scheme also prevents serious attacks such as smart card cloning and McCormac Hack attack particular to authentication using smart cards.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [41] A secure and efficient time-bound hierarchical access control scheme for secure broadcasting
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    International Journal of Ad Hoc and Ubiquitous Computing, 2016, 22 (04) : 236 - 248
  • [42] A three-party authenticated key exchange scheme smartcard using elliptic curve cryptosystem for secure key exchange in wireless sensor network
    Yang, Jongwon
    Seo, Changho
    Cho, Jinman
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 339 - +
  • [43] Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT
    Tan, Zuowen
    Jiao, Jintao
    Chen, Yanliang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (08):
  • [44] A Privacy-Aware Reconfigurable Authenticated Key Exchange Scheme for Secure Communication in Smart Grids
    Gope, Prosanta
    Sikdar, Biplab
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (06) : 5335 - 5348
  • [45] Secure key exchange scheme: A DNA computing-based approach to resist MITM in DHKE
    Sreeja C.S.
    Misbahuddin M.
    International Journal of Information and Computer Security, 2021, 16 (3-4) : 307 - 323
  • [46] CE-SKE: cost-effective secure key exchange scheme in Fog Federation
    Yashar salami
    Yaser Ebazadeh
    Vahid Khajehvand
    Iran Journal of Computer Science, 2021, 4 (4) : 305 - 317
  • [47] IPTV CAS using Efficient Group Key Management Scheme
    Kang, Yonggoo
    Lim, Jihwan
    Oh, Heekuck
    Kim, Sangjin
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 257 - +
  • [48] An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing
    Liu, Chang
    Zhang, Xuyun
    Liu, Chengfei
    Yang, Yun
    Ranjan, Rajiv
    Georgakopoulos, Dimitrios
    Chen, Jinjun
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 9 - 16
  • [49] Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
    Coruh, Ugur
    Bayat, Oguz
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [50] Efficient and quantum-secure authenticated key exchange scheme for mobile satellite communication networks
    Mishra, Dheerendra
    Rewal, Purva
    Pursharthi, Komal
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2024, 42 (04) : 313 - 328