Browse > Article
http://dx.doi.org/10.6109/jkiice.2011.15.12.2670

Personal Authentication Protocol of IPTV Game User using PIN Code  

Jeong, Yoon-Su (한남대학교 산업기술연구소)
Kim, Yong-Tae (한남대학교 멀티미디어학부)
Abstract
Because of the development of IPTV, user is provided service of multimedia data regardless the location. But the number of users who try to get service of IPTV game illegally is also increasing. In this paper, user authentication protocol in IPTV housing using PIN code not to access easily for teenagers not to access to prohibited games. The proposed protocol combines authority data in IPTV household and creates a disposable password using PIN code to prevent teenagers from accessing illegally to the prohibited games and saves the data in certification server and set-top box to prevent forced accessing.
Keywords
IPTV; PIN Code; Authentication; Protocol;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Y. L. Huang, S.P. Shieh, and J.C. Wang, "Practical Key Distribution Scheme for Channel Protection," IEEE Twenty-Fourth Annual International Computer Software&Applications Conference, 2000.
2 T. Jiang, S. Zheng, and B. Liu, "Key Distribution Based on Hierarchical Access Control for Conditional Access System in DTV Broadcast," IEEE Trans. On Consumer Electronics, Vol.50, No.1, pp.225-230, 2004.   DOI   ScienceOn
3 T. Jiang. Y. Hou, and S. Zheng, "Secure Communicatio between Set-Top Box and Smart Card in DTV Broadcasting", IEEE Transaction on Consumer Electronics, Vol 50(3), pp. 882-886, 2004.   DOI   ScienceOn
4 E. Yoon and K. Yoo, "A New Secure Key Exchange Protocol between STB and Smart card in DTV broadcasting", Proc. of the Intelligence and Security Informations(ISI), Vol. 3917, LNCS, pp. 139-150, 2009.
5 S. Lee, N. Park,S. Kim, and J. Choi, "Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting", Proc. of the Advances in Information Security and Assurance(AISA), Vol 5576, LNCS, pp. 797-803, 2009.
6 T. Hou, J. Lai and C. Yen, "Based on Cryptosystem Secure Communication between Set-Top Box and Smart Card in DTV Broadcasting", Proc of the TENCON07, pp. 1-5, 2007.
7 H. Kim, "Secure Communication in Digital TV Broadcasting", International Journal of Computer Science and Network Security(IJCSNS), vol.8(9), pp.1-5, 2008.
8 Gartner Group, "An Introduction to IPTV (Television via Internet Protocol)," Oct. 2005.
9 Y. S. Jeong, Y. T. Kim, Y. S. Jung, G. C. Park and S. H. Lee, "A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service", Journal of KIISE : Informatio Networking, Vol. 37, No. 3, pp. 187-197, Jun. 2010.
10 Y. S. Jeong, Y. S. Jung, Y. T. Kim, G. C. Park and S. H. Lee, "A Security Model Analysis Adopt to Authentication State Information in IPTV Environment", The Journal of Korea Information and Communication Society, Vol. 35, No. 3, pp. 421-430, Mar. 2010.
11 F. K. Tu, C. S. Laih, and H. H. Tung, "On Key Distribution Management for Conditional Access System on Pay-TV System," IEEE Trans. On Consumer Electronics, vol. 45, pp. 151-158, February 1999.   DOI   ScienceOn
12 Y. S. Jeong, Y. T. Kim, G. C. Park and S. H. Lee, "User Authentication Mechanism for using a Secure IPTV Service in Mobile Device", The Journal of Korea Information and Communication Society, Vol. 34, No. 4, pp. 377-386, Apr. 2009.
13 Y. S. Jeong, Y. T. Kim, G. C. Park and S. H. Lee, "A Low-weight Authentication Protocol using RFID for IPTV User", Journal of The Korea Institute of Information Security and Cryptology, Vol. 19, No. 2, pp. 105-116, Apr. 2009.