Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2009.16-C.1.21

Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme  

Shin, Ki-Eun (성균관대학교 휴대폰학과)
Choi, Hyoung-Kee (성균관대학교 정보통신공학부)
Abstract
Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.
Keywords
Conditional Access System; IPTV; Source Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Yoshimura, “Conditional access system for digital broadcasting in Japan,” Proc. of IEEE, pp.318-322, Jan., 2006   DOI   ScienceOn
2 B. Lu et al., “A scalable key distribution for conditional access system in digital pay-tv sys-tem,” IEEE Trans. On Consumer Electronics, pp.632-637, May, 2004   DOI   ScienceOn
3 J. M. Park et al., “Efficient multicast packet authentication using signature amortization,” Proc. IEEE Symp. Security and Privacy, pp.227-240, May, 2002   DOI
4 A. Perrig et al., “Efficient authentication and signing of multicast streams over lossy channels,” Proc. IEEE Symp. Security and Privacy, pp.56-73, May, 2000   DOI
5 A. Perrig et al., “Efficient and secure source authentication for multicast,” Net. and Distrib. Sys. Sec. Symp., pp.35-46, Feb. 2001
6 XySSL Project, http://www.xyssl.org
7 Neal Seitz, “ITU-T QoS Standards for IP-Based Networks,” IEEE Communications Maga-zine, pp.82-89, Jun., 2003
8 ITU-T, “Security architecture for systems providing end-to-end communications,” ITU-T Rec. X.805, 2003
9 Won. Young J. et al., “End-user IPTV traffic measurement of residential of broadband access networks,” Proc. of IEEE NOMS Workshops, pp.95-100, Apr., 2008   DOI
10 R. C. Merkle, “A digital signature based on a conventional encryption function,” Advances in Cryptography, CRYPTO'87, 1987, pp.369-378