Browse > Article

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device  

Jeong, Yoon-Su (충북대학교 전자계산학과 네트워크보안 연구실)
Kim, Yong-Tae (한남대학교 멀티미디어공학부)
Park, Gil-Cheol (한남대학교 멀티미디어공학부)
Lee, Sang-Ho (충북대학교 전기전자컴퓨터공학부)
Abstract
IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.
Keywords
IPTV Service; User Authentication; Content Security; Mobile Equipment;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Fiat and M. Naor, 'Broadcast encryption', in Advances in Cryptology - CRYPTO'93, 1994, vol. 773, pp. 480-491   DOI
2 R. Canetti, J. Garey, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, 'Multicast security: A taxonomy and some efficient constructions', in Proc. IEEE Infocomm'99, Mar. 1999, vol. 2, pp. 708-716
3 S. Emmanuel and M. S. Kankanhalli, 'A Digital rights management scheme for broadcast video', multimedia Syst. J., vol. 8, no. 6, pp. 444-458, 2003   DOI   ScienceOn
4 Y. L. Huang and S. Shieh, 'Efficient key distribution scheme for secure media delivery in pay-TV systems', IEEE Trans. Multimedia, vol. 6, no. 5, pp. 760-769, Oct. 2004   DOI   ScienceOn
5 H. Harney and E. Harder, 'Logical Key Hierarchy Protocol', IETF 1999[Online]. Availaber: Internet Draft, draft-harney-sparta-lkhp-\sec-00.txt
6 D. Naor, M. Naor and J. B. Lotspiech, 'Revocation and tracing schemes for stateless receivers', in Advances in Cryptology - CRYPTO'01, 2001, vol. 2139, LNCS, pp. 41-62
7 D. Halevy and A. Shamir, 'The LSD broadcast encryption scheme', in Proc. CRYPTO 2002, 2002, vol 2442, LNCS, pp. 47-60
8 B. Rosenblatt, B. Trippe, and S. Mooney, 'Digital Rights Management-Business and Technology', M&T Books, 2002
9 F. K. Tu, C. S. Laih, and S. H. Toung, 'On key distribution management for conditional access system on pay-TV system,' IEEE Trans. Consumer Electron., vol, 45, no. 1, pp. 151-158, Feb, 1999   DOI   ScienceOn
10 J. Lyu et al., 'Design of Open APIs for Personaled IPTV Service', Proceedings of 9th Internaltional Conference on Advanced Communication Technology, Vol. 1, Feb. 2007, pp. 305-310
11 A. T. Sherman and D. A. McGrew, 'Key establishment in large dynamic groups using one-way functions trees', IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458, May 2003   DOI   ScienceOn
12 J. W. Lee, 'Key distribution and management for conditional access system on DBS', in Proc. Int. Conf. Cryptology and Information Security, 1996, pp. 82-86
13 A. M. Eskicioglu, 'Protecting Intellectual Property in Digital Multimedia Networks,' IEEE Computer, Vol. 36, pp. 39-45, 2003
14 D. Wallner, E. Harder, and R. Agee, 'Key Management for Multicast: Issues and Architectures IETF', 1999, RFC 2627