Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.2.145

A Convergence Technology of IPTV-RFID against Clone Attack  

Jeong, Yoon-Su (Chungbuk National University)
Kim, Yong-Tae (Hannam University)
Park, Gil-Cheol (Hannam University)
Lee, Sang-Ho (Chungbuk National University)
Abstract
Now a days, the development of TV and internet like communicational technique makes IPTV service which combines internet with multimedia contents increase. But when a user gets service in specific place, the certification process and user's ID check in IPTV service is complicate so that there occurs communicational difficulty like increasing illegal users and service delay etc. This paper proposes communication security mechanism to prevent Clone attack which happens in wireless section by efficiently extracting illegal user. The proposed mechanism performs key distribution procedure, inter certification procedure, and key initiation procedure by putting security agent in RFID-USB for RFID tags users use to perform plug-and-plug function. Also, the proposed mechanism updates the hased token value by its ID and the random number which RFID-USB creates whenever a user accesses in the area of RFID-USB so that it protects reply attack and man-in-the-middle attack which happen often in the area of wireless section.
Keywords
IPTV USB; Clone attack; RFID;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 김세일, 이현숙, 이동훈, "익명성을 제공하는 스마트카드 사용자 인증 프로토콜," 정보보호학회 논문지, 17(2), pp. 139-144, 2007년 4월.   과학기술학회마을
2 H.M. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp. 958-961, Nov. 2000.   DOI   ScienceOn
3 김세일, 천지영, 이동훈, "추적이 가능한 스마트카드 사용자 인증 기법," 정보보호학회논문지, 18(5), pp. 31-38, 2008년 10월.   과학기술학회마을
4 C.P. Schnorr, "Efficient identification and signatures for smart cards," In Crypto'89, LNCS 435, pp. 235-251, 1990.
5 S.T. Wu and B.C. Chieu, "A Note on a User Freindly Remote User Authentication Scheme with Smart Cards," IEICE Transactions Fundamentals, vol. 87-A, no. 8, pp. 2180-2181, Aug. 2004.
6 유혜정, 이현숙, "스마트카드를 이용한 속성기반 사용자 인증 스킴," 정보보호학회논문지, 18(5), pp. 41-47, 2008년 10월.   과학기술학회마을
7 S.T. Wu and B.C. Chieu, "A User Friendly Remote Authentication Scheme with Smart cards," Computers & Security, vol. 22, no. 6, pp. 547-550, Sep. 2003.   DOI   ScienceOn
8 H. Sakakibara, K. Seki, K. Okada, and Y. Matsushita, "The ID-based noninteractive group communication key sharing scheme using smart cards," in Proc. Int. Conf. Network Protocols, pp. 91-98, Oct. 1994.
9 D.S. Wong and A.H. Chan, "Mutually authentication and key exchange for low power wireless communications," proc. IEEE MILCOM 2001, vol. 1, pp. 39-43, Aug. 2001.
10 T. Jiang, S. Zheng, and B. Liu, "Key Distribution Based on Hierarchical Access Control for Conditional Access System in DTV Broadcastion," IEEE Trans. On Consumer Electronics, vol. 50, no. 3, pp. 882-886, Aug. 2004.   DOI   ScienceOn
11 F. Yuli and L. Wei, "A New RFID-USB Key," IEEE International Workshon on Anti-counterfeiting, Security, Identification 2007, pp. 440-443, Apr. 2007.
12 F.K. Tu, C.S. Laih, and S.H. Toung, "On key distribution management for conditional access system on pay-TV system," IEEE Trans. Consumer Electron., vol. 45, no. 1, pp. 151-158, Feb. 1999.   DOI   ScienceOn
13 W. Kanjanarin and T. Amomraksa, "Scrambling and Key Distribution Scheme for Digital Television," IEEE International Conference on Networks, pp. 140-145, Oct. 2001.
14 정윤수, 김용태, 박길철, 이상호, "RFID를 이용한 IPTV 사용자의 경량화 인증 프로토콜," 정보보호학회논문지, 19(2), pp. 105-116, Apr. 2009.   과학기술학회마을
15 T.W. Hou, J.T. Lai, and C.L. Yeh, "Based on Cryptosystem Secure Communication between Set-top Box and Smart card in DTV Broadcasting," TENCON 2007, IEEE Region 10 Conference, pp. 1-5, Oct. 2007.
16 A.M. Eskicioglu, "Protecting Intellectual Property in Digital Multimedia Networks," IEEE Computer, vol. 36, no. 7, pp. 39-45, Mar. 2003.   DOI   ScienceOn
17 J. Lyu, S.J. Pyo, J.Y. Lim, M.C. Kim, S.W. Lim, and S.K. Kim, "Design of Open APIs for Personaled IPTV Service," Proceedings of 9th International Conference on Advanced Communication Technology, vol. 1, no. 4, pp. 305-310, Feb. 2007.
18 T. Jiang, Y. Hou, and S. Zheng, "Secure Communication between Set-top Box and Smart Card in DTV Broadcasting," IEEE Trans. on Consumer Electronics, vol. 50, no. 3, pp. 882-886, Aug. 2004.   DOI   ScienceOn
19 S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," in 1st Intern. Conference on Security in Pervasive computing(SPC), pp. 201-212, Mar. 2003.
20 A. Juels, "Minimalist Cryptography for RFID Tags," In C. Blundo, ed., Security of Communication Networks(SCN), pp. 149-164, Sep. 2004.