Browse > Article
http://dx.doi.org/10.6109/jkiice.2013.17.1.68

Design of Efficient Adult Authentication Model for prevent of illegal Service of Child in IPTV Service Environment  

Jeong, Yoon-Su (목원대학교 정보통신공학과)
Kim, Yong-Tae (한남대학교 멀티미디어학부)
Abstract
Recently IPTV that transmits multimedia contents in real time through internet, cable TV net and satelite net gets the limelight. But IPTV service that gives service to users by various media has a problem of not supporting user certification fully. This paper suggests a certification model which prevents getting access permission of IPTV service by sending illegal certification information by adolescent through integrating mobile communication technique with RFID(Radio Frequency IDentification) technique which is a key technique of Ubiquitous environment. This model performs the process of adult certification by keeping synchronization with user's certificaiton information that is saved in data-base of certification server and contents server after getting the system of class categorization in contents server to overcome disadvantage of simple adult certification system that is popular in the existing internet. Also, it adapts double hash chain technique not to down load illegally contents without the permission of manager even if an adolescent gets manager's approval key.
Keywords
IPTV Service; Authentication; RFID; Protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Pagani(2003), "Multimedia and Interactive Digital TV - Managing the Opportunities Created by Digital Convergence", IRM Press, 2003.
2 Y. S. Jeong(2012), "RFID-based Authentication Protocol for ImplantableMedicalDevice", The Journal Of Digital Policy & Management, Vol. 10, No. 2, pp. 141-146.
3 Y. L. Huang and S. Shieh(2004), "Efficient key distribution scheme for secure media delivery in pay-TV systems", IEEE Trans. Multimedia, vol. 6, no. 5, pp. 760-769.   DOI   ScienceOn
4 A. T. Sherman and D. A. McGrew(2003), "Key establishment in large dynamic groups using one-way functions trees", IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458.   DOI   ScienceOn
5 B. K. Rhee, Y. S. Jeong, S. H. Lee(2012), "Privacy Model based on RBAC for U-Healthcare Service Environment", Journal of Information & Communication, Vol. 16, No. 3, pp. 13-19.
6 Y. S. Jeong, Y. T. Kim, G. C. Park and S. H. Lee(2009), "A Low-weight Authentication Protocol using RFID for IPTV Users", Journal of Inforamation Security & Cryptology, pp. 105-116.
7 T.-W. Hou, J.-T. Lai and C.-L. Yeh(2007), "Based on CryptosystemSecure Communication between Set-top Box and Smart card in DTV Broadcasting" , TENCON 2007, IEEE Region 10 Conference, 2007, pp.1-5.
8 D. S. Wong and A. H. Chan, "Mutually authentication and key exchange for low power wireless communications", proc. IEEE MILCOM 2001, Vol. 1, pp. 39-43.
9 T. Jiang et al(2004), "Key Distribution Based on Hierarchical Access Control for Conditional Access System in DTV Broadcastion", IEEE Trans. On Consumer Electronics, Vol. 50, No. 3, August, 2004, pp. 882-886.   DOI   ScienceOn
10 S. T. Wu and B. C. Chieu(2003), "A User Friendly Remote Authentication Scheme with Smart cards", Computers & Security 22 (6), 2003, pp. 547-550.   DOI   ScienceOn
11 S. T. Wu and B. C. Chieu(2004), "A Note on a User Freindly Remote User Authentication Scheme with Smart Cards", IEICE Transactions Fundamentals 87-A(8), Aug. 2004. pp. 2180-2181.